Building an Adoption Plan: Think Outside the Box (Part 1 of 2)Cisco Canada
You have made the leap…invested in collaboration solutions…the boxes have arrived and software secured. Now the question is how do I roll it out to my organization and my different line of business users to meet their unique needs?
Our collaboration portfolio has never been more flexible to accommodate the needs of a diverse and ever changing workforce. Whether you are an HR leader, field worker, sales executive or individual contributor, you can leverage the same collaboration investment to meet your distinct requirements. In this session, we will review these distinct requirements and showcase the appropriate collaboration use cases from both a horizontal line of business lens and a vertical lens.
TechEvent 2019: More Agile, More AI, More Cloud! Less Work?!; Oliver Dörr - T...Trivadis
The document discusses how organizations can increase agility through cloud technologies like containers and serverless computing. It notes that cloud platforms allow developers and operations teams to work more collaboratively through a DevOps approach. This enables continuous delivery of applications and infrastructure as code. The document also emphasizes the importance of security, compliance and control when adopting cloud technologies and a cloud native approach.
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
The document discusses Cisco DNA Center's network assurance capabilities, providing an overview of the assurance dashboard, client health monitoring features, and troubleshooting tools like path trace and client 360 views. It describes how DNA Center provides end-to-end visibility into network and client health through wireless insights, device monitoring, and guided remediation actions. The presentation also covers the hardware and software requirements for deploying DNA Center's assurance module.
Adopting an SD-WAN solution is the best option that network organizations have to respond to a range of requirements such as lowering cost, increasing availability and providing high quality user experiences. However, network organizations are also under pressure to deliver best-of-breed security and in virtually all instances, adopting an SD-WAN solution results in implementing Direct Internet Access (DIA) which is challenging to secure using security appliances.
Cisco Digital Network Architecture is based on these pillars
1) Service Virtualisation (eNFV and 3th party hosting)
2) Automation/SDN/Policy based networking
3) Analytics
4) Orchestration
5) Hybrid
6) Open and Programmable
7) Physical and Virtual
8) Software Driven
Analytics are key to implement NaaS (Network as a Sensor) and NeeE (Network as Enforcer)
https://masimatteo.wordpress.com/2016/06/21/from-we-must-have-a-network-cheap-to-ask-the-network-how-to-reinvent-the-business/
- Oracle is the 2nd largest software company in the world with over 400,000 customers in 145 countries.
- Oracle offers a complete cloud solution including autonomous database capabilities that automate database and infrastructure management.
- Oracle's autonomous database is self-driving, self-securing, and self-repairing to save on human labor, prevent human errors, and require no human intervention.
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
ThousandEyes EMEA webinar from July 2nd 2019 @ 1000 UK time covering troubleshooting Office 365 applications using ThousandEyes. Presented by Ian Waters, Director of Solutions Marketing and Tim Hale, Senior Solutions Engineer.
ServiceNow is an enterprise IT cloud company that transforms IT by automating and managing IT across organizations. It has over 2300 customers and 2100 employees. Justin Dolly is the CISO of ServiceNow. Previously, ServiceNow's security tools were disparate and information was difficult to access. ServiceNow now collects over 400GB of data daily with Splunk, using it as their SIEM to provide threat identification, event correlation, and compliance reporting across the enterprise. Events detected by Splunk trigger actions that push data into ServiceNow, where a security team analyzes events and elevates potential incidents for investigation.
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
The document discusses Cisco DNA Assurance, a network performance management solution. It provides end-to-end visibility across the network through continuous monitoring of devices, clients, applications and traffic flows. Cisco DNA Assurance helps isolate issues, replicate problems in historic network contexts, and provides guided remediation actions to resolve problems quickly. It aims to optimize network operations through actionable insights and simplify troubleshooting tasks.
The document discusses how IT is evolving in a cloud world. Key points include:
- Business is driving digital transformation and IT must change from technology-first to business-first to remain relevant.
- There is only one global network that businesses don't control, so the focus must shift from security controls to managing risk.
- Transformation starts with changing organizational mindsets to embrace new business models.
- Zscaler's cloud security platform can help organizations securely adopt the cloud by providing a consistent security policy for all users on any network or device.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Most organizations have heard of the cloud, but not everyone is at the same stage on their cloud journey. This SlideShare overviews how to best leverage the cloud, the multitude of options and the typical stages of transition. Also outlined are the steps you can take to get where you want to go on your cloud journey faster and more efficiently.
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
Cisco's DNA Assurance product provides network administrators with tools to help troubleshoot network issues through contextual data and insights. It uses a 360-degree contextual graph to isolate problems, allows network administrators to replicate issues through historical data and predictive analytics, and provides step-by-step guided remediation to resolve problems quickly based on Cisco's expertise. Case studies on Houston Methodist Hospital and Stanford University found that DNA Assurance helps identify small problems before they become big issues and provides the information needed to effectively manage large, complex networks.
The document discusses Aruba Networks' mobile-first architecture and its focus on intelligent edge networking for the mobile, cloud, and IoT era. It highlights Aruba's innovations in wired and wireless networking, its global presence, and its leadership in areas like secure access and analytics-driven security. The architecture is built to enable and safeguard BYOD access while redefining digital workplaces with technologies like mobile UC, location services, and IoT.
The document discusses how digital transformation is driving the need for cloud-based security solutions and modernized network architectures. It describes Zscaler's cloud security platform as enabling organizations to securely access applications in the cloud while simplifying their networks. The presentation outlines how Zscaler has helped one large global organization transition to the cloud by providing a consistent security posture across its network.
This document discusses VMware's hyper-converged infrastructure (HCI) solution using VMware vSAN software-defined storage. It begins by describing the limitations of traditional 3-tier architectures and how HCI addresses these by converging compute, storage, and networking. The document then provides details on VMware vSAN, including its features, performance advantages, market adoption rates, and pricing. It positions vSAN and VMware's HCI solution as enabling data center modernization through agility, scale, simplified management, and lower costs.
Windows management for a modern workplace
As companies embrace the modern workplace, they’re also evolving their approach to managing and deploying Windows 10 and Office 365 ProPlus. Flexibility, security and ease are at the core of providing a better user experience, and a lower TCO.
Rethinking Cybersecurity for the Digital Transformation EraZscaler
The document summarizes a company's journey of transforming their network and security architecture to the cloud over 5 phases. Some key points:
- Phase 1 consolidated their WAN vendor and migrated email/collaboration tools to Office 365 to simplify their infrastructure.
- Phase 2 deployed the Zscaler Cloud Security Platform to enable local internet access from branches instead of deploying appliances to 870 locations.
- Phase 3 eliminated more on-prem appliances and deployed Zscaler services to provide consistent security for mobile users.
- Phases 4-5 migrated applications to cloud platforms, consolidated data centers, and deployed Zscaler Private Access to provide a zero-trust network model and simplified application access without VPNs.
Rethinking Cybersecurity for the Digital Transformation EraZscaler
The document discusses a large global organization's journey to cloud transformation over 5 phases. Phase 1 focused on WAN consolidation and embracing SaaS. Phase 2 implemented Zscaler to improve internet access. Phase 3 extended consistent security to mobile users. Phase 4 migrated apps to IaaS and consolidated data centers. Phase 5 implemented Zscaler Private Access for a zero-trust network and positive user experience. The transformation provided cost savings, a more agile IT environment, consistent user experience, and reduced business risk.
Cloud computing is the fifth generation of computing that allows applications to be accessed from anywhere via the internet. It is projected to grow six times faster than traditional IT spending, reaching $42 billion by 2012. Key benefits include lower upfront and ongoing costs, easier application access, and improved datacenter utilization. However, security concerns, latency issues, and lack of control present barriers for some applications. Private enterprise clouds can provide cloud advantages internally while addressing barriers through server virtualization, availability, and control over resource allocation.
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
The document discusses Cisco's vision for a simplified IT management approach through a digital platform. Some key points:
- Cisco aims to simplify IT through a platform approach that delivers applications/services consistently across clouds, is extensible and open.
- The platform focuses on ubiquitous connectivity, actionable insights, secure data, simplified user experiences, and flexibility in consuming/deploying IT assets.
- Automation enabled by APIs and data-driven models allows consistent experiences and programmatic actions to simplify operations.
Barriers to entry are collapsing as digital startups come out of nowhere to disrupt entire industries. In this session we will discuss the capabilities you need to deliver business innovation through software to market faster than your competitors.
Speaker: Faiz Parkar, Director EMEA GTM, Pivotal
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
Red Hat OpenShift is enabling quicker adoption of DevOps practices. Containers are an essential component of DevOps and the OpenShift Kubernetes Container Platform is integral for orchestration within these environments. Data security is now challenged to keep pace with the size and scope of container usage. The migration from legacy in-house deployments to hybrid-cloud installations has created new attack surfaces as data is shared more freely in Kubernetes deployments.
Protecting data at rest and in motions is a necessity. Learn how you can keep data protected and securely share data in OpenShift environments with real-time data protection solutions.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Secure remote access to AWS your users will loveZscaler
59% of enterprises are running applications in AWS and users are accessing them from outside the network. As adoption takes place incumbent technology, like the remote access VPN, provide a poor user experience and introduce additional networking and security complexity. This not only slows cloud initiatives, but frustrates users and makes life difficult for admins.
Can cloud computing completely change the way companies use technology to service customers, partners and suppliers? What is meant by public clouds, private clouds, and hybrid clouds? Do you know how cloud computing impacts your organization?
A talk about the new security feature App Transport Security enabled in iOS9 & OSX10.11's SDKs. What is it and what are the impacts for us developper ?
ServiceNow is an enterprise IT cloud company that transforms IT by automating and managing IT across organizations. It has over 2300 customers and 2100 employees. Justin Dolly is the CISO of ServiceNow. Previously, ServiceNow's security tools were disparate and information was difficult to access. ServiceNow now collects over 400GB of data daily with Splunk, using it as their SIEM to provide threat identification, event correlation, and compliance reporting across the enterprise. Events detected by Splunk trigger actions that push data into ServiceNow, where a security team analyzes events and elevates potential incidents for investigation.
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
The document discusses Cisco DNA Assurance, a network performance management solution. It provides end-to-end visibility across the network through continuous monitoring of devices, clients, applications and traffic flows. Cisco DNA Assurance helps isolate issues, replicate problems in historic network contexts, and provides guided remediation actions to resolve problems quickly. It aims to optimize network operations through actionable insights and simplify troubleshooting tasks.
The document discusses how IT is evolving in a cloud world. Key points include:
- Business is driving digital transformation and IT must change from technology-first to business-first to remain relevant.
- There is only one global network that businesses don't control, so the focus must shift from security controls to managing risk.
- Transformation starts with changing organizational mindsets to embrace new business models.
- Zscaler's cloud security platform can help organizations securely adopt the cloud by providing a consistent security policy for all users on any network or device.
Three Key Steps for Moving Your Branches to the CloudZscaler
Is backhauling traffic the most efficient way to route traffic when your workloads move to the cloud? The migration of applications from the data center to the cloud calls for a new approach to networking and security. But, keeping up with application demands and user expectations can be a struggle. Explore the challenges and benefits of establishing secure local breakouts from someone who has done it.
Most organizations have heard of the cloud, but not everyone is at the same stage on their cloud journey. This SlideShare overviews how to best leverage the cloud, the multitude of options and the typical stages of transition. Also outlined are the steps you can take to get where you want to go on your cloud journey faster and more efficiently.
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
Cisco's DNA Assurance product provides network administrators with tools to help troubleshoot network issues through contextual data and insights. It uses a 360-degree contextual graph to isolate problems, allows network administrators to replicate issues through historical data and predictive analytics, and provides step-by-step guided remediation to resolve problems quickly based on Cisco's expertise. Case studies on Houston Methodist Hospital and Stanford University found that DNA Assurance helps identify small problems before they become big issues and provides the information needed to effectively manage large, complex networks.
The document discusses Aruba Networks' mobile-first architecture and its focus on intelligent edge networking for the mobile, cloud, and IoT era. It highlights Aruba's innovations in wired and wireless networking, its global presence, and its leadership in areas like secure access and analytics-driven security. The architecture is built to enable and safeguard BYOD access while redefining digital workplaces with technologies like mobile UC, location services, and IoT.
The document discusses how digital transformation is driving the need for cloud-based security solutions and modernized network architectures. It describes Zscaler's cloud security platform as enabling organizations to securely access applications in the cloud while simplifying their networks. The presentation outlines how Zscaler has helped one large global organization transition to the cloud by providing a consistent security posture across its network.
This document discusses VMware's hyper-converged infrastructure (HCI) solution using VMware vSAN software-defined storage. It begins by describing the limitations of traditional 3-tier architectures and how HCI addresses these by converging compute, storage, and networking. The document then provides details on VMware vSAN, including its features, performance advantages, market adoption rates, and pricing. It positions vSAN and VMware's HCI solution as enabling data center modernization through agility, scale, simplified management, and lower costs.
Windows management for a modern workplace
As companies embrace the modern workplace, they’re also evolving their approach to managing and deploying Windows 10 and Office 365 ProPlus. Flexibility, security and ease are at the core of providing a better user experience, and a lower TCO.
Rethinking Cybersecurity for the Digital Transformation EraZscaler
The document summarizes a company's journey of transforming their network and security architecture to the cloud over 5 phases. Some key points:
- Phase 1 consolidated their WAN vendor and migrated email/collaboration tools to Office 365 to simplify their infrastructure.
- Phase 2 deployed the Zscaler Cloud Security Platform to enable local internet access from branches instead of deploying appliances to 870 locations.
- Phase 3 eliminated more on-prem appliances and deployed Zscaler services to provide consistent security for mobile users.
- Phases 4-5 migrated applications to cloud platforms, consolidated data centers, and deployed Zscaler Private Access to provide a zero-trust network model and simplified application access without VPNs.
Rethinking Cybersecurity for the Digital Transformation EraZscaler
The document discusses a large global organization's journey to cloud transformation over 5 phases. Phase 1 focused on WAN consolidation and embracing SaaS. Phase 2 implemented Zscaler to improve internet access. Phase 3 extended consistent security to mobile users. Phase 4 migrated apps to IaaS and consolidated data centers. Phase 5 implemented Zscaler Private Access for a zero-trust network and positive user experience. The transformation provided cost savings, a more agile IT environment, consistent user experience, and reduced business risk.
Cloud computing is the fifth generation of computing that allows applications to be accessed from anywhere via the internet. It is projected to grow six times faster than traditional IT spending, reaching $42 billion by 2012. Key benefits include lower upfront and ongoing costs, easier application access, and improved datacenter utilization. However, security concerns, latency issues, and lack of control present barriers for some applications. Private enterprise clouds can provide cloud advantages internally while addressing barriers through server virtualization, availability, and control over resource allocation.
Cisco connect winnipeg 2018 simple it leads to simple it managementCisco Canada
The document discusses Cisco's vision for a simplified IT management approach through a digital platform. Some key points:
- Cisco aims to simplify IT through a platform approach that delivers applications/services consistently across clouds, is extensible and open.
- The platform focuses on ubiquitous connectivity, actionable insights, secure data, simplified user experiences, and flexibility in consuming/deploying IT assets.
- Automation enabled by APIs and data-driven models allows consistent experiences and programmatic actions to simplify operations.
Barriers to entry are collapsing as digital startups come out of nowhere to disrupt entire industries. In this session we will discuss the capabilities you need to deliver business innovation through software to market faster than your competitors.
Speaker: Faiz Parkar, Director EMEA GTM, Pivotal
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
Red Hat OpenShift is enabling quicker adoption of DevOps practices. Containers are an essential component of DevOps and the OpenShift Kubernetes Container Platform is integral for orchestration within these environments. Data security is now challenged to keep pace with the size and scope of container usage. The migration from legacy in-house deployments to hybrid-cloud installations has created new attack surfaces as data is shared more freely in Kubernetes deployments.
Protecting data at rest and in motions is a necessity. Learn how you can keep data protected and securely share data in OpenShift environments with real-time data protection solutions.
Ready to deploy Office 365? If you think it’s going to be easy enough, you may want to think again. Microsoft Office 365 was designed to be accessed directly via the internet, and most companies simply don’t have the appropriate network setup. It’s no surprise, then, that deploying Office 365 without proper guidance can delay deployments and cause a terrible user experience
Secure remote access to AWS your users will loveZscaler
59% of enterprises are running applications in AWS and users are accessing them from outside the network. As adoption takes place incumbent technology, like the remote access VPN, provide a poor user experience and introduce additional networking and security complexity. This not only slows cloud initiatives, but frustrates users and makes life difficult for admins.
Can cloud computing completely change the way companies use technology to service customers, partners and suppliers? What is meant by public clouds, private clouds, and hybrid clouds? Do you know how cloud computing impacts your organization?
A talk about the new security feature App Transport Security enabled in iOS9 & OSX10.11's SDKs. What is it and what are the impacts for us developper ?
This document outlines a transportation and facility security plan for handling hazardous materials pursuant to regulatory requirements. It details administrative responsibilities, procedures for reporting suspicious activity, screening hazmat personnel, securing information, conducting security inspections, controlling facility access, and en-route security. Requirements include qualifying motor carriers, verifying identities, checking seals and documentation, avoiding populated areas when routing, making regular check-ins, and inspecting vehicles for tampering.
The survey found that a majority (54%) of Americans think the TSA is doing an excellent or good job handling airport security screening. Additionally, 41% think TSA screening procedures are extremely or very effective at preventing terrorism. However, opinions on the TSA's effectiveness are more mixed. While most Americans and air travelers say procedures are at least somewhat effective, younger Americans have more positive views of the TSA compared to older Americans. Overall, the survey indicates the average American has a more positive than negative view of the TSA, though they are not totally confident in its effectiveness.
The Transportation Security Administration, an agency of the U.S. Department of Homeland Security, was created in the aftermath of 9/11 to oversee security for all transportation systems. This presentation, updated October 2015, provides information on the background, mission, and operations of TSA. For more information, visit www.tsa.gov.
Cloud computing and Cloud security fundamentalsViresh Suri
This document provides an overview of cloud computing fundamentals and cloud security. It defines cloud computing and describes the different cloud service models and deployment models. It discusses the benefits of cloud computing like elastic capacity and pay as you go models. It also covers some challenges of cloud like security, reliability and lack of standards. The document then focuses on cloud security, describing common security threats, key considerations like network security, access control and monitoring for public clouds. It provides examples of security services from AWS like CloudTrail, Config, Key Management and VPC.
The document discusses the three journeys an organization can take towards cloud native transformation: greenfield, legacy, and transformation. The greenfield journey involves new projects with little integration into existing systems, while the legacy journey focuses on modernizing critical existing systems which risks consuming all attention. The transformation journey aims to change the entire organization's culture and ways of working to benefit from cloud native approaches at scale.
The ability to deliver software is no longer a differentiator. In fact, it is a basic requirement for survival. Companies that embrace cloud native patterns of software delivery will survive; companies that don’t - will not.
In this webinar, we will:
- Look at the common patterns that distinguish cloud native companies and the architectures that they employ.
- Discover that an opinionated platform, one that stretches from the infrastructure all the way to the application framework, rather than ad-hoc automation, is an essential component to an enterprise's cloud native journey.
- Show that the combination of Pivotal Cloud Foundry and Spring is the complete cloud native platform.
Speaker:
Faiz Parkar
DIRECTOR OF PRODUCT MARKETING
As Director of Product Marketing for Pivotal in the Europe, Middle East and Africa region, Faiz Parkar loves working at the intersection of cloud native platforms, big data/analytics and agile application development to help organisations deliver compelling data-driven software experiences for their customers. With more than 25 years experience in the IT industry, Faiz has helped organisations large and small to take advantage of technology transitions from proprietary systems to client/server, from physical infrastructure to virtual, and from virtual infrastructure to cloud. His mission now is to help organisations accelerate their digital transformation journey and reinvent themselves as the digital leaders of the future.
Transportation planning involves preparing for the movement of people and goods by identifying transportation needs, defining systems, and considering efficiency, quality, and equity. It uses several models and studies - including trip generation, distribution, modal split, and traffic assignment - to understand existing and future travel demand and develop an optimal transportation network. Common transportation studies in the planning process are origin-destination studies, traffic volume studies, speed studies, and parking studies, which provide key data for planning decisions.
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
This document discusses strategies for data center and cloud transformation over the next 5 years. It outlines key digital business trends like data growth, cloud adoption, and security threats that are driving organizations' IT initiatives. These include managing increased data and applications, optimizing cloud strategies, addressing disruptive business models, and securing distributed data and applications. The document advocates adopting flexible consumption models, automation, and supporting edge/IoT applications. It positions Cisco as uniquely able to enable digital transformations through its portfolio of networking, compute, storage, automation, analytics, and security solutions.
Cisco Connect 2018 Thailand - Secure, intelligent platform for the digital bu...NetworkCollaborators
This document discusses digital transformation and the secure, intelligent platform needed to enable it. It notes that digital transformation involves adopting new technologies and business models to increase agility, productivity and customer experiences while reducing costs. The platform should amass and unlock big data, embrace multi-cloud environments, reinvent the network, and leverage machine learning/AI to drive business insights. Cisco's strategies for its Spark, DNA Center and other platforms aim to provide such a secure, intelligent platform for digital business.
This presentation will provide an insider's look at challanges and offer strategies and technologies to maximize IT envoirnments today and for the future.
Cisco at VMworld 2015 - Cisco UCS as the Foundation for Software-Defined Data...ldangelo0772
IT is in the midst of a dramatic shift to the mobile-cloud era, one in which IT services can be consumed on-demand across the enterprise and in hybrid and public clouds. Tjerk Bijlsma will share the latest Cisco Unified Computing System (Cisco UCS) innovations that can help you shape your Software-Defined Data Center, radically simplifying IT while delivering services at the speed of today's business.
During this session you will learn about:
Cisco's comprehensive architectural approach to enable next wave of IT convergence that includes VMware vSAN and comprehensive vRealize integration as part of the SDDC.
Innovations in Cisco Data Center portfolio including Cisco UCS and Nexus integrations with VMware solutions.
Solutions for virtualized environments for Converged and Hyper Converged systems including FlexPod, VersaStack, Vblock, vSAN, Simplivity, StorMagic and more.
Стратегия Cisco в ЦОД (доклад на английском языке)Cisco Russia
1) The document discusses Cisco's data center architecture and solutions for digitization, IoT, cloud-native applications, and hybrid cloud. It focuses on Cisco's UCS, HyperFlex, ACI, and CloudCenter products.
2) Cisco's data center architecture centers around policy-driven infrastructure with UCS, HyperFlex, ACI, and hybrid cloud solutions. Key products discussed include UCS, HyperFlex, ACI, and CloudCenter.
3) The architecture is designed to provide a foundation for business agility through integrated infrastructure, hyperconvergence, software-defined networking, hybrid cloud, and multi-cloud management.
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco Canada
At Partner Summit we made a series of exciting announcements in our Cloud portfolio, including our acquisition of CliQr. Join us to learn about these new announcements and an understanding of Cisco’s Cloud Strategy.
- How does CliQr fit into our existing Cloud portfolio (Metapod, APIC, Enterprise Cloud Suite, Cloud Consumption-as-a-Service)?
- How does our Cloud portfolio today meet the needs of our customers? What problems are we solving?
- How does our portfolio today position us for the world of Containers and Microservices?
Join us for a presentation of how these announcements fit into our current environment and what they mean to your longer-term strategy.
Cisco and F5 accelerate Application DeliveryShashi Kiran
This document discusses the partnership between Cisco and F5 and their focus on application-centric infrastructure. It highlights key capabilities of Cisco's Application Centric Infrastructure (ACI) including policy-driven automation, integration with F5's BIG-IP and BIG-IQ solutions, and addressing joint customer needs. It also provides an overview of WWT's Advanced Technology Center and how they help customers prove and adopt new technologies like ACI through demo environments and other services.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
This document discusses how cloud computing can accelerate innovation and drive new business models for enterprises. It notes that private and public cloud models can optimize capital expenditures, lower operating expenses, improve uptime and service delivery times. The transition to cloud often requires changes to roles, skills, processes and organizational structure. Key benefits of cloud include lower total cost of ownership, increased speed and agility, operational simplicity, and ability to easily scale. A hybrid cloud model combining on-premise and off-premise resources can deliver benefits like cost reduction, revenue growth, strategic budget allocation, and faster provisioning times.
This document discusses how cloud computing can accelerate innovation and drive new business models for enterprises. It notes that private and public cloud models can optimize capital expenditures, lower operating expenses, improve uptime and service delivery times. The transition to cloud often requires changes to roles, skills, processes and organizational structure. Key benefits of cloud include lower total cost of ownership, increased speed and agility, operational simplicity, and ability to easily scale. A hybrid cloud model combining on-premise and off-premise infrastructure can deliver benefits like cost reduction, revenue growth, strategic budget allocation, and faster provisioning times.
CISCO’s Cloud Journey (Keynote at Cloud Symposium) Marcus McEwen
The following slide show details a high level analysis of Cisco’s view of The Cloud. This presentation was given by Kanjal Trevidi from Cisco Cloud and Managed Services Business Development at the Equivoice Cloud Symposium
Cisco Powered Presentation - For CustomersCisco Powered
The document discusses Cisco Powered, a program that provides cloud and managed services through validated partners using Cisco technologies. It highlights key aspects of the Cisco Powered methodology including a broad services portfolio, security everywhere, enabling fast IT, choice of consumption models, services and networks designed together, strategic alignment with ecosystem partners, enterprise-class SLAs, independently validated services, and industry innovation leadership. The document also provides information on finding a Cisco Powered services provider.
Oracle's cloud computing strategy is to support both public and private clouds to give customers choice. Oracle offers the technology to build private clouds or run workloads in public clouds. It also offers applications deployed in private shared services environments or via public SaaS. The strategy is based on Oracle's existing virtualization, grid computing, shared services, and management technologies and provides customers the most complete, open, and integrated cloud vision and offerings.
The document discusses how cloud computing and software as a service (SaaS) platforms can transform supply chain collaboration. It describes how SaaS leverages cloud architectures to provide a global platform that connects a company's supply chain partners in an "extended enterprise" network. This allows all participants to maximize revenue and minimize costs through improved efficiency and profitability. Specifically, SaaS provides controlled access to centralized supply chain data and analytics to drive better execution and profits across the extended enterprise.
A New Approach to Continuous Monitoring in the CloudNETSCOUT
In this #CLUS 2019 session, you will learn how NETSCOUT’s smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and accelerate customer migration to the Cloud. You will review real-life examples of how businesses optimized their Cloud migration gaining visibility and deep insights, in both physical and virtual worlds, to maintain continuity and security of the services throughout the migration process.
This document provides an overview of IT/Network Operations concepts and strategies to improve cloud production. It begins with Joe Dietz introducing himself as a Network Security Professional and listing his current certifications. It then discusses various local user groups and events related to cloud security. The document covers topics such as selecting public vs private clouds, choosing cloud providers and applications, operational considerations, and approaches to connecting networks to the cloud such as extending datacenters or enabling edge services. It emphasizes that moving to the cloud still requires planning and not all applications are good candidates. The summary concludes by mentioning related reading on hybrid cloud services and tools.
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
The Briefing Room with Mark Madsen and Cisco
Live Webcast August 18, 2015
Watch the archive: https://bloorgroup.webex.com/bloorgroup/lsr.php?RCID=0eff120f8b2879b582b77f4ff207ee54
Today's digital enterprises are seeing an explosion of data at the edge. The Internet of Everything is fast approaching a critical mass that will demand a sea change in how companies process data. This new world of information is widely distributed, streaming, and overall becoming too big to move. Experts predict that within two to three years, the bulk of analytic processing will take place on the fringes of information architectures. As a result, forward-thinking companies are dramatically shifting their analytic strategies.
Register for this episode of The Briefing Room to hear veteran Analyst Mark Madsen of Third Nature explain how a new era of information architectures is now unfolding, paving the way to much more responsive and agile business models. He'll be briefed by Kim Macpherson of the Cisco Data and Analytics Business Unit, who will explain how her company's platform is uniquely suited for this new, federated analytic paradigm. She'll demonstrate how edge analytics can help companies address opportunities quickly and effectively.
Visit InsideAnalysis.com for more information.
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
Patomphon Vimolket introduces Cisco's vision for enabling next-generation data center transformations through software-defined technologies. The document discusses challenges like evolving threats, manual operations, and digital disruption. It presents Cisco's data center reference architecture and portfolio including Cisco CloudCenter, Nexus, UCS, HyperFlex, ACI, Intersight, and security solutions like Tetration and AppDynamics. These provide application visibility, infrastructure optimization, and security to help businesses adapt to challenges like multicloud, microservices, and more dynamic environments.
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
The document discusses network slicing, which is the next step in virtualization for 4G/5G mobile networks. Network slicing allows the core network to be partitioned into multiple logical networks or "slices", each with its own network functions to support the requirements of different services. This approach enables network resources and functions to be allocated to specific services or customer segments in a flexible manner. It reduces complexity compared to existing networks that must support many different services and customers on a single common infrastructure. The key benefits of network slicing include improved network agility and the ability to support diverse service requirements.
The document summarizes a Cisco presentation on next-generation datacenter security. It discusses how the majority of security teams' time is spent securing servers and data in the datacenter. It then covers challenges such as budget constraints, product overload, and complexity of threats. The presentation introduces Cisco's architectural approach to datacenter security focusing on threat prevention, visibility, segmentation, threat intelligence, automation, and analytics. It provides examples of Cisco solutions that integrate to deliver firewall, access control, analytics, and other capabilities.
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
The document discusses Cisco's multi-cloud strategy and products. It introduces Cisco Container Platform (CCP) as a solution that automates deploying, running, and operating containers on physical or virtual machines. CCP is based on Kubernetes and provides integrated networking, management, security and analytics capabilities while allowing containers to run in hybrid cloud environments across VM, bare metal, Cisco HyperFlex, ACI and public clouds.
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
The document discusses Cisco's solutions for securing mobility, including Meraki SM, Cisco AMP for Endpoint, Cisco Umbrella, Cisco Cloudlock, Cisco Cloud Email Security, Cisco Threat Response, Identity Service Engine, and Cisco DUO Security. Representatives from Cisco provide overviews of each solution for securing users, data, and applications across SaaS, PaaS, and IaaS environments.
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Cisco Connect Montreal provided information on Cisco's Webex Hybrid Services which allow for integration between on-premises and cloud collaboration solutions. The key services discussed included Hybrid Directory Service for user synchronization, Hybrid Calendar Service for calendaring integration, Hybrid Call Service for calling capabilities, Hybrid Message Service for messaging interoperability, and the new Cisco Webex Edge service for enhanced audio, video mesh, and media experiences.
Integration cisco et microsoft connect montreal 2018Cisco Canada
The document discusses Cisco and Microsoft integrations for collaboration. It describes major areas of integration including calling, messaging, meetings, email/calendar, content management, and instant messaging. It provides details on Cisco and Microsoft integrations for meetings, with examples of joining internal and external participants. The document also discusses Cisco Spark and Webex capabilities for open collaboration across organizations and platforms.
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
This document summarizes a presentation on model-driven programmability for Cisco IOS XR. The presentation covers data models, management protocols like NETCONF and gRPC, the YANG Development Kit (YDK) SDK, and telemetry. It defines key concepts like model-driven manageability, native and open data models, protocol operations, and the benefits of the YDK for simplifying application development through model-driven abstractions. Example code demonstrates basic YDK usage and a potential peering configuration use case is outlined. Resources for further information are also provided.
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
The document discusses Cisco SD-WAN and its advantages over traditional and legacy WAN architectures. It highlights how Cisco SD-WAN uses a centralized control plane and software-defined intelligence to provide automated, predictive, and intent-based networking. This allows for flexible, scalable, and secure connectivity across hybrid WAN transports in a way that is simpler to manage and operate than hardware-centric WAN solutions.
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
The document discusses Cisco's DNA Center and its capabilities for automating network management. It covers:
- Why intent-based networking is needed to reduce costs and errors from manual network changes
- How DNA Center supports intent-based networking by allowing administrators to define policies and have them automatically implemented across the network
- Key automation use cases DNA Center addresses like onboarding new devices, managing software upgrades, creating configuration templates, and deploying wireless networks
- Demonstrations of DNA Center's capabilities for plug-and-play deployment, software management, template configuration, and wireless provisioning
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Robert Barton from Cisco presented on Cisco Kinetic, an IoT analytics platform. Cisco Kinetic consists of three modules: the Gateway Management Module for onboarding and managing IoT gateways at scale, the Edge and Fog Processing Module for analyzing IoT data in real-time at the edge, and the Data Control Module for securely routing IoT data between edge, fog, and cloud according to data policies. Cisco Kinetic aims to enable end-to-end IoT analytics across the entire network from device to cloud.
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Hank Preston, a Cisco engineer, gave a presentation on DevNet and how it is helping developers. He discussed how DevNet has grown significantly, now with over 100,000 members and 500,000 learning labs completed. DevNet provides resources like APIs, sandboxes, and training to help developers build applications and automate networks. Preston emphasized that networks are becoming more programmable and automated through DevNet tools and platforms.
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
The document discusses Cisco's DNA Assurance solution. It provides an agenda that covers business requirements, context, learning, user requirements, technology requirements, and the various components of DNA Assurance including client assurance, network assurance, application assurance, and machine learning. It discusses challenges around network operations including time spent troubleshooting and replicating issues. It also covers how DNA Assurance uses concepts like context, learning, and design thinking to provide insights and automate remediation.
Cisco Connect Toronto 2018 network-slicingCisco Canada
The document discusses network slicing, which is the partitioning of network resources and functions to run selected applications, services, or connections in isolation from each other for specific business purposes. This allows mobile operators to offer virtual private networks on a common infrastructure through network slicing on an end-to-end basis across access, transport, and core networks. Slicing enables new revenue opportunities through network slices optimized for different vertical industries while simplifying service delivery and management.
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
The document discusses Cisco Meraki's intelligent network and SD-WAN capabilities. It highlights that Meraki has over 14,000 customers using its SD-WAN, it has a renewal rate over 95%, and its newest product is WAN assurance. The presentation provides an overview of Meraki's cloud-managed solutions for wireless, switching, security, and other IT functions. It demonstrates Meraki's network monitoring and troubleshooting tools through examples and a demo of its capabilities.
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
The document discusses automating security tasks through various solutions from Cisco. It introduces the Cisco Advanced Malware Protection (AMP) solution, which uses machine learning to detect known and unknown malware across endpoints, networks, and email. It also introduces Cisco Cognitive Threat Analytics, which analyzes web traffic using machine learning to detect anomalous and malicious activity inside organizations. The document provides examples of how these solutions can automate tasks like hunting for threats, detecting anomalies, and attributing suspicious activity to specific entities. It includes demos of the AMP and Cognitive Intelligence user interfaces.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
How Can I use the AI Hype in my Business Context?Daniel Lehner
𝙄𝙨 𝘼𝙄 𝙟𝙪𝙨𝙩 𝙝𝙮𝙥𝙚? 𝙊𝙧 𝙞𝙨 𝙞𝙩 𝙩𝙝𝙚 𝙜𝙖𝙢𝙚 𝙘𝙝𝙖𝙣𝙜𝙚𝙧 𝙮𝙤𝙪𝙧 𝙗𝙪𝙨𝙞𝙣𝙚𝙨𝙨 𝙣𝙚𝙚𝙙𝙨?
Everyone’s talking about AI but is anyone really using it to create real value?
Most companies want to leverage AI. Few know 𝗵𝗼𝘄.
✅ What exactly should you ask to find real AI opportunities?
✅ Which AI techniques actually fit your business?
✅ Is your data even ready for AI?
If you’re not sure, you’re not alone. This is a condensed version of the slides I presented at a Linkedin webinar for Tecnovy on 28.04.2025.
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc
Most consumers believe they’re making informed decisions about their personal data—adjusting privacy settings, blocking trackers, and opting out where they can. However, our new research reveals that while awareness is high, taking meaningful action is still lacking. On the corporate side, many organizations report strong policies for managing third-party data and consumer consent yet fall short when it comes to consistency, accountability and transparency.
This session will explore the research findings from TrustArc’s Privacy Pulse Survey, examining consumer attitudes toward personal data collection and practical suggestions for corporate practices around purchasing third-party data.
Attendees will learn:
- Consumer awareness around data brokers and what consumers are doing to limit data collection
- How businesses assess third-party vendors and their consent management operations
- Where business preparedness needs improvement
- What these trends mean for the future of privacy governance and public trust
This discussion is essential for privacy, risk, and compliance professionals who want to ground their strategies in current data and prepare for what’s next in the privacy landscape.
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...Alan Dix
Talk at the final event of Data Fusion Dynamics: A Collaborative UK-Saudi Initiative in Cybersecurity and Artificial Intelligence funded by the British Council UK-Saudi Challenge Fund 2024, Cardiff Metropolitan University, 29th April 2025
https://alandix.com/academic/talks/CMet2025-AI-Changes-Everything/
Is AI just another technology, or does it fundamentally change the way we live and think?
Every technology has a direct impact with micro-ethical consequences, some good, some bad. However more profound are the ways in which some technologies reshape the very fabric of society with macro-ethical impacts. The invention of the stirrup revolutionised mounted combat, but as a side effect gave rise to the feudal system, which still shapes politics today. The internal combustion engine offers personal freedom and creates pollution, but has also transformed the nature of urban planning and international trade. When we look at AI the micro-ethical issues, such as bias, are most obvious, but the macro-ethical challenges may be greater.
At a micro-ethical level AI has the potential to deepen social, ethnic and gender bias, issues I have warned about since the early 1990s! It is also being used increasingly on the battlefield. However, it also offers amazing opportunities in health and educations, as the recent Nobel prizes for the developers of AlphaFold illustrate. More radically, the need to encode ethics acts as a mirror to surface essential ethical problems and conflicts.
At the macro-ethical level, by the early 2000s digital technology had already begun to undermine sovereignty (e.g. gambling), market economics (through network effects and emergent monopolies), and the very meaning of money. Modern AI is the child of big data, big computation and ultimately big business, intensifying the inherent tendency of digital technology to concentrate power. AI is already unravelling the fundamentals of the social, political and economic world around us, but this is a world that needs radical reimagining to overcome the global environmental and human challenges that confront us. Our challenge is whether to let the threads fall as they may, or to use them to weave a better future.
Quantum Computing Quick Research Guide by Arthur MorganArthur Morgan
This is a Quick Research Guide (QRG).
QRGs include the following:
- A brief, high-level overview of the QRG topic.
- A milestone timeline for the QRG topic.
- Links to various free online resource materials to provide a deeper dive into the QRG topic.
- Conclusion and a recommendation for at least two books available in the SJPL system on the QRG topic.
QRGs planned for the series:
- Artificial Intelligence QRG
- Quantum Computing QRG
- Big Data Analytics QRG
- Spacecraft Guidance, Navigation & Control QRG (coming 2026)
- UK Home Computing & The Birth of ARM QRG (coming 2027)
Any questions or comments?
- Please contact Arthur Morgan at [email protected].
100% human made.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...SOFTTECHHUB
I started my online journey with several hosting services before stumbling upon Ai EngineHost. At first, the idea of paying one fee and getting lifetime access seemed too good to pass up. The platform is built on reliable US-based servers, ensuring your projects run at high speeds and remain safe. Let me take you step by step through its benefits and features as I explain why this hosting solution is a perfect fit for digital entrepreneurs.
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersToradex
Toradex brings robust Linux support to SMARC (Smart Mobility Architecture), ensuring high performance and long-term reliability for embedded applications. Here’s how:
• Optimized Torizon OS & Yocto Support – Toradex provides Torizon OS, a Debian-based easy-to-use platform, and Yocto BSPs for customized Linux images on SMARC modules.
• Seamless Integration with i.MX 8M Plus and i.MX 95 – Toradex SMARC solutions leverage NXP’s i.MX 8 M Plus and i.MX 95 SoCs, delivering power efficiency and AI-ready performance.
• Secure and Reliable – With Secure Boot, over-the-air (OTA) updates, and LTS kernel support, Toradex ensures industrial-grade security and longevity.
• Containerized Workflows for AI & IoT – Support for Docker, ROS, and real-time Linux enables scalable AI, ML, and IoT applications.
• Strong Ecosystem & Developer Support – Toradex offers comprehensive documentation, developer tools, and dedicated support, accelerating time-to-market.
With Toradex’s Linux support for SMARC, developers get a scalable, secure, and high-performance solution for industrial, medical, and AI-driven applications.
Do you have a specific project or application in mind where you're considering SMARC? We can help with Free Compatibility Check and help you with quick time-to-market
For more information: https://www.toradex.com/computer-on-modules/smarc-arm-family
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Cyber Awareness overview for 2025 month of securityriccardosl1
Enterprise Data Center and Cloud: "Efficiency, Speed, Disruption"
1. Jeff Minson
TSA – GSP Cloud Partners
October 20, 2015
“Efficiency, Speed, Disruption”
Enterprise
Data Center and Cloud
2. 78%
Workloads processed
in Cloud DCs
by 2018
5TB+
of data per person
by 2020
180B
Mobile apps
downloaded
in 2015
30M
New devices
connected
every week
277X
Data created
by IoE devices
v. end-user
Data Center and Cloud Power Digital Disruption
4.2B
Web filtering
blocks per
day
6. What if you Could…
EFFICIENCY
+
DISRUPTION
+
SPEED
7. Don’t Get Left Behind!
Source: IDC InfoBrief, sponsored by Cisco, Don't Get Left Behind: The Business Benefits of Achieving
Greater Cloud Adoption, Aug 2015
* Figures refer to IDC’s Cloud Adoption Model—Optimized Stage Averages
IT COST REDUCTION
77%
REVENUE GROWTH*
10%
STRATEGIC ALLOCATION
OF IT BUDGET*
200%
TIME TO PROVISION
IT SERVICES
99%
ABILITY TO MEET SLAS
72%
EFFICIENCY
+
DISRUPTION
+
SPEED
8. Security
Data Center and Cloud Transformation
Minimum IT Capabilities
EFFICIENCY
+
DISRUPTION
+
SPEED
Automation
Flexible
Consumption Models
Edge / IoT
Applications
9. Security
Minimum Capabilities Are not Enough!
Only Cisco Enables Your Digital Transformation Journey
EFFICIENCY
+
DISRUPTION
+
SPEED
Automation
Policy Driven Integrated Infrastructure
Flexible
Consumption Models
Choice of Consumption
with Security and Data Sovereignty
Edge / IoT
Applications
Edge / IoT Applications
and Real Time Analytics
Security
Everywhere
11. Cisco Ecosystem Delivers Choice
Any Application Across Any Consumption Model
Business Applications Analytics DevOps and CloudBig Data Internet of Things
APPLICATION PARTNERS
DATA CENTER PARTNERS INTERCLOUD PARTNERS
12. Policy—Beyond Automation
An Innovative Differentiator for Digitized Services
One Policy Driven Integrated Infrastructure for traditional and cloud native applications
DATA CENTER
AUTOMATION
Provisioning
Faster Workflow
Lifecycle Acceleration
PRIVATE
CLOUD
Deploy applications from
different business units
on separate dev and
production networks
PERVASIVE
SECURITY
Specify and automate
security and compliance
rules
CUSTOMER
EXPERIENCE
Enable customized
experiences for users
and devices at the edge
HYBRID
CLOUD
One common policy for
private and public clouds
13. Cisco Offers—Beyond Flexible Consumption
Support for Any Consumption Model
Build Your Own
As a Service
On-Prem or in the Cloud
Ownership Customer Cisco / Partner
Location On-Prem Cisco / Partner
Management Customer Cisco + Partner Cisco / Partner
BUYBUILD
Cloud Managed Public CloudIT Operated
Cisco Data Center
Private/Hybrid Cloud Infrastructure
Cisco Professional Services
Cisco Metapod
Cisco Professional Services
Cisco and Partner Intercloud Services
Cisco Powered Cloud Services from
Partners
Cisco Professional Services
14. Edge/IoT—Beyond Apps and Traditional Analytics
A New Approach is Needed to Reach and Analyze That Data
Structured Data Unstructured Data Data Streaming at the Edge
Traditional Data
Warehouse Big Data Store
Short-term
Make a Decision Today
Real-time
Make a Decision NOW
Long-term
Plan for a Business Decision
15. Security Everywhere
Across the full attack continuum, before, during and after an attack
Threat-focused
Network-Integrated,
Broad Sensor Base,
Context and Automation
Platform-based
Agile and Open Platforms,
Built for Scale, Consistent
Control, Management
Visibility-driven
Network-Integrated,
Broad Sensor Base,
Context and Automation
Pervasive | Integrated | Open | Continuous
16. Market Traction: Innovation Leadership
Cisco Nexus
Cisco UCS Director (Orchestrates Compute, Network, Storage And L4-7), OpenStack
Cisco ONE Software Licensing and Subscription
LAN Switching Blade Server
Application
Centric SDN
Hybrid Cloud
Infrastructure Security
Integrated
Infrastructure
Cisco UCS Cisco ACI
Cisco Intercloud Cisco UCS, Nexus Cisco Security
#1 #2 #1
#1 #1 #1
Cloud Infrastructure
Equipment
Cisco Intercloud
#1
Cisco UCS
World-
Records
100+
17. Cisco Delivers Business Outcomes Today!
EFFICIENCY
+
DISRUPTION
+
SPEED
A 13-month payback,
166% ROI…savings of
$1.27+M over 3 years –
Oak Hill School District
Saving 20% on
infrastructure, 30% on
power, and 50% on space
Grew capacity by
“over 5x for the
same AWS cost”
“We generated $145M in business benefits
and successfully managed the Symantec /
Veritas split”
Quantium has positioned itself to stay
well ahead of our competitors for the
foreseeable future
Software engineers
increased time devoted
to development from 50
to 80 percent
“We saved 6 months
versus DIY OpenStack”
“We accelerated
provisioning from
hours to minutes”
“We’ve gone from days
to hours to add new
devices and capacity”
18. For More Resources…
DATA CENTER
www.cisco.com/go/datacenter
CLOUD
www.cisco.com/go/cloud
SECURITY
www.cisco.com/go/security
SERVICES
www.cisco.com/go/services
20. SaaS
PaaS IaaS
Cisco Ecosystem Delivers Choice Any
Application Across Any Consumption Model
Optional slide for
discussions related to
Big Data and IoT
customers
Traditional
Applications
Cloud Native
Applications
Data Center Cloud Edge / IoTData Center Cloud Edge / IoT
21. Cisco Ecosystem Delivers Choice
Any Application Across Any Consumption Model
Business Applications Analytics DevOps and CloudBig Data Internet of Things
APPLICATION PARTNERS
Microsoft
IBM
SAP
Oracle
Cloudera
Pivotal
MAPR
Hortonworks
Greenplum
Informatica
MicroStrategy
Appfluent
SAP
Datastax
SAS
Splunk
Platfora
Elasticsearch
Actian
Tableau
Rockwell
Automation
Honeywell
Emerson
Schneider
United
Technologies
MongoDB
Docker
Openstack
Ruby
Puppet Labs
Python
PHP
Lamp
DATA CENTER PARTNERS INTERCLOUD PARTNERS
Microsoft
VCE
Openstack
IBM
bmc
Nimble
Storage
Windows
Server
Redhat
Vmware
EMC2
Citrix
Hitachi
NetApp
CA
Symantec
F5
Panduit
Opscode
Check Point
Software
Technologies
Netscout
A10 Networks
AVI Networks
Fortinet
Zenoss
Radware
CFEngine
Simplivity
Telstra
CGI
BT
ANS
Proximus
Adapt
Deutsche
Telekom
Capgemini
Accenture
Dimension
Data
Nescout
CCI
Bezea
WIPRO
TechData
Comstar
NTTDATA
CTC
Iland
Presidio
QTS
Forsythe
Telefonica
LG CNS
NWN
Ingram
Micro
CDW
Sentinel
NetCast
Infront
Jonhson
Controls
Nantian
Information
World Wide
Technology
Inc.
Sungard
Availability
Services
Optional slide when
inclusion of
customer/partner
logos may be
problematic.
Editor's Notes
#3:
Digital transformation - the use of technology to radically improve performance or reach of enterprises — is changing the world. We are seeing an explosion of devices and mobile apps, and in data utilization.
For example, IDC predicts that by 2017, there will be 3.6 billion global Internet users…more than ½ the world’s population. And those users are keeping busy, with 180B mobile apps, downloaded in 2015, a 233% increase over the year before. And the impact on data is enormous. IoE devices create 277 times the data vs. the end user, and by 2020, there will be more than 5000Gb (or 5TB+) of data for every person on Earth. And by 2018, 78% of workloads are expected to be processed in cloud data centers (does not mean public cloud…but more towards cloud native which we’ll cover). Meanwhile, the natural consequence of such explosive growth is a corresponding rise in the nature and magnitude of security threats, with 4.2 billion web filtering blocks per day being just the tip of the iceberg.
This unprecedented growth in devices, mobile apps, data, use of cloud, and security risks are powering the disruption of traditional business models, forcing organizations to change their requirements for today’s and tomorrow’s business processes, architectures, and governance. The data center and cloud play a central role in how IT enables the business to turn the challenge of digital disruption into an opportunity.
Additional Security factoids: (Source: Cisco Talos Security Intelligence and Research Group (Talos))
1.1 Million Incoming Malware Samples Per Day, Increasing Daily
4.2 Billion Web Filtering Blocks Per Day
1 Billion Sender Base Reputation Queries Per Day
Sources:
277x Data Created by IoE devices v end – user – source: 2014 Cisco Global Cloud Index
78% workloads processed in Cloud DCs by 2018: source 2014 Cisco Global Cloud Index
By 2020, there will be 5,200 GB of data for every person on Earth – source: 2012 Digital Universe Study conducted by IDC and sponsored by EMC (see: http://www.computerworld.com/article/2493701/data-center/by-2020--there-will-be-5-200-gb-of-data-for-every-person-on-earth.html)
180 billion mobile app downloads by 2015 – source: 2011 IDC Study: https://www.smaato.com/blog-180billiondownloads/
#4: So its just not about the DC any more …. The boundary is expanded by the cloud. Not necessarily architecturally but based on new biz models as LOB move aggressively in this direction. And very important is creating disruption…
That opportunity lies in finding ways to disrupt or run the risk of being disrupted. However, for you to be able to stay ahead of disruption a broader perspective is required one that goes beyond the traditional data center model.
We must now go beyond the data center, expanding its value into the cloud, as well as the edge and IoT. It’s a view not limited to just a network topology or architecture discussion, but rather, it is about the new business models made available to you by the cloud. And when it comes to the edge and IoT, we only have to look to the market to see where the opportunity lies. When we look at the true disruptors in the market, whether they be Uber, Spotify, Airbnb, or Stripe, they engage their customers at the edge of the network with smart applications that leverage disruptive technologies, data, mobility, and devices.
But going beyond the data center also requires extending security. Organizations are under unrelenting attack, with security breaches happening every day from a global community of attackers targeting organizations of all sizes through a network perimeter that has large dissolved due to trends like mobility and BYOD. Security from the data center to the edge requires the protection against a wider array of attack vectors.
To digitize your business processes and realize the IoE $19 trillion opportunity in value by 20201, you need to take advantage of this expanded landscape to drive business outcomes, thus requiring you to evolve architectures for infrastructure, development, and security, as well as business and governance models
Additional Notes:
The edge is defined as the IT boundary closest to the user. In the past, this has been limited to the branch office. While the branch (or retail store) is still critically important, the Internet of Things is changing that definition. Now, the edge is often the IT boundary closest to the sensors, customers, security cameras and other devices that are feeding and processing information for either immediate use or analysis later.
According to the Cisco 2015 Annual Security Report, malware is becoming increasingly sophisticated and elusive; cybercriminals are launching attacks through a variety of attack vectors including tools that users trust or viewed as benign; and targeted attacks are on the rise, creating a persistent, hidden presence within an organization and from which to execute their mission.
Since 2009, we have seen a 66 percent compound annual growth rate of detected incidents.
________________________________________
1 IoE research: http://ioeassessment.cisco.com/
#5: All of this makes now for a very interesting playground….
New cloud native apps are on the rise right now….
You can expect to continue supporting traditional applications such as ERP, client/server, and CRM for many years to come (systems of record). But just as important, you should also recognize that the most innovative, agile, and disruptive applications are cloud-native, or born in and for the cloud (systems of engagement). They are different to legacy apps in that they are modular, designed for the mobile-cloud era, built around DevOps principles and utilize some of the technologies like OpenStack and Docker – also known as containers - spawned by open source communities. These applications are cheap to develop, massively scalable, and key enablers in the digitization of business processes in a mobile-centric world.
But to be successful across the spectrum (from the data center to cloud and to the edge), you must first acknowledge that this is not a binary situation. In other words, this is not a question of “either…or.” With some traditional applications making the migration to cloud-native version, the situation really calls for a common infrastructure that can support a continuum of existing / traditional applications and new cloud native applications
http://www.smartercomputingblog.com/smarter-computing/systems-of-engagement/
We are moving from a dependency on systems of record, where systems were designed around discrete pieces of information (“records”) to systems of engagement, which are more decentralized, incorporate technologies which encourage peer interactions, and often leverage cloud technologies to provide the capabilities to enable those interactions.
For instance, what’s the value of a mobile engagement solution that doesn’t know the past records? The reality is that the current systems of record applications have to prepare for an onslaught of requests from new systems of engagement applications. It is imperative that organizations speedily adapt to meet these ever-changing demands. The IT resources must enable integration to the extent that it adds real value to the organizations.
Hence, the vision of CIOs now is to modernize and transform the core systems and infrastructure to easily implement the new systems of engagement applications. Without a robust IT infrastructure, interfacing the new systems of engagement applications with systems of record will be a challenge. It is no longer an option to build the right IT infrastructure to successfully navigate the new paradigm that most companies are experiencing.
http://insights.wired.com/profiles/blogs/systems-of-engagement-in-the-cloud-for-commerce#axzz3p1gtTHuo
#6: But that’s not an easy task.
‘
Its not binary – its more of a continuum between these 2 clusters
Hybrid, open source, growth, speed not just or only back office.
Hi-light shadow it
An an incredible set of complexities in place
Think of this as ‘different clouds for different crowds’
Confronted by digital transformation, you recognize the need to innovate more, manage risk better, and establish more agility. However, you have to do this while simultaneously running the business and hitting regular performance goals. So whether you characterize them using Gartner’s “Bi-Modal IT” model or simply by their attributes, when it comes to talking about traditional and cloud native applications, it’s truly a tale of two ITs.
On one hand, you have traditional investments in consolidation, virtualization, and similar initiatives to continually reduce risk and bring efficiency to data centers. You must support traditional systems of records and provide robust capabilities for business critical applications. This implies the need to ‘get it right’ by emphasizing high availability, stability, accuracy and predictability via highly efficient and repeatable processes (e.g., ITSM).
Unfortunately, efficiency doesn’t necessarily equal speed. In other words, efficiency alone does not enable you to adequately support the unpredictability that is progressively associated with market disruptions. Therefore, a new mindset is required. And along with that an IT organizational profile and a set of supporting IT capabilities that are radically different. Agility and speed need to be emphasized. This is a world of DevOps, agile methods and microservices…a world of failing faster, but learning and moving to the next iteration to manage uncertainty…a world of the the new application developer playing a critical role in the consumption of cloud services as the enterprise moves to digitize their business and processes.
If IT organizations fail to build their environments for speed, LOBs leaders and their developers will continue to go around IT to more easily and quickly access and/or develop those cloud native applications for their business needs and consequently give rise to Shadow IT.
#7: So the challenge is…can you have the best of both worlds?
…I must still be efficient.
…but I also must be agile and provide services to stakeholders more quickly
What if you were able to find the right combination that allows you to keep increasing the efficiency of your IT operations while investing in new IT capabilities that boost speed and agility…the right combination that allows you to create, nurture, and grow an organization that is better positioned to partner with the business to capitalize on and even initiate market disruption?
In other words, what if you could drive both efficiency and speed and leverage disruption (or even be the disruptor) in the market?
#8: New data from Cisco sponsored study to measure business outcomes.
The real deal is the impact on the top line of the company – 10% revenue growth while tripling the ability to efficiently manage services for LOBs and stakeholders.
The benefits of such a strategy are significant and measurable when it comes to the critical elements necessary to achieve your business outcomes
For example, collaborating with IDC, we were able to examine those companies at the highest stages of cloud maturity and derived averages for their improvement in KPIs across a large number of organizations that IDC profiled.
Companies saw improvements in:
Efficiency when it comes to IT cost reduction and their ability to meet SLAs,
Speed with accelerated provisioning of IT services,
And finally, their ability to enable disruption by being able to invest in more strategic (and less routine and maintenance) projects to foster innovation and drive revenue growth.
With 25% of organizations already having well-defined cloud strategies in place, your opportunity to lead is now, and you don’t want to get left behind.
---
Definitions based on IDC’s taxonomy:
IT Cost Reduction (including, technology, services, people) - Measurement (in %) of the reduction in IT operations costs.
Ability to meet Service Level Agreements (SLAs) – Ability to put forward risk mitigation strategies. Measurement (in %) of the increase in meeting SLAs.
Time to provision IT services (for internal users) – time required by IT to deploy servers and set up access for internal users in support of a new application. Measurement (in %) of the reduction in time.
Revenue Growth - Ability of IT to help LOBs positively impact revenue growth - Measurement (in %) of the increase in revenue.
Strategic Allocation of IT Budget - Ability to fund strategic versus routine/maintenance projects. Measurement of the increase of IT budget allocated for new projects.
#9: So the question now is how do we get there? How do we move forward? What are the minimum IT capabilities needed?
In the quest for efficiency, IT organizations have already invested in consolidation and virtualization. They next area of focus to drive efficiencies now is automation, meaning the ability to simplify and bring consistency to provisioning, improve workflows, and accelerate IT services lifecycles. And while automation’s sweet spot may start with efficiency, its function and impact needs to continually extend and evolve beyond the data center as we expand our playing field into cloud and to the edge and IoT.
When it comes to speed, it’s a matter of delivering on the needs of stakeholders (such as LOB leaders and developers) in a timely fashion to help them stay ahead of market disruptions and capitalize on new opportunities faster. This requires support for flexible consumption models to deliver new IT and business services, whether sourced internally or externally. More IT shops are becoming “cloud brokers” of sorts cuz sales and marketing might need box.com, bring it under SSO, etc., to enable its use.
And when it comes to disruption, the next wave of market disruption is coming from IoE/IoT applications and goes well beyond big data and enabling M2M communication. It requires a radically different shift in what we consider the traditional boundaries of IT organizations. With the right IT capabilities, information from the IoE can be turned into actions quickly, creating new and disruptive capabilities, richer and innovative experiences, and unprecedented economic opportunity.
And finally, with the considerable complexity of today’s IT environment, especially when that environment includes public resources, its critical to ensure security is pervasive across the extended network. This is policy driven infrastructure that can help drive and embed security…
So at a minimum, you need automation, support for flexible consumption models, edge/IoT applications, and security to make this combination of efficiency, speed, and disruption a reality.
Note: The Internet of Everything (IoE) connects people, processes, data, and things, making network connections more relevant and valuable than ever before.
#10: But why settle for only the bare minimum?
And I think Cisco’s approach is to think a little bigger and broader in regard to the tenants of automation, flexible consumption on analytics.
Beyond automation to a Policy Driven Integrated Infrastructure, where policy not only drives the automation of your data center, but can be extended as a cornerstone of your expansion into the cloud, leveraging the network to support your application and security requirements.
Beyond just being flexible and accommodating of different consumption models to being able to support any consumption model…regardless of the application…regardless of which cloud…and always with security and data sovereignty in mind. With Cisco and our partners, you can match the right consumption model for each workload across the build to buy continuum, ranging from IT operated, to cloud managed, to public cloud.
Beyond just edge/IoT applications to the more potent combination of edge/IoT applications and real time analytics to empower your applications by taking advantage of all your data from the data center to the edge. Organizations need intelligence in order to make decisions about their business. Analytics are required to gather this intelligence. Yet, the traditional approach of moving data to a centralized data store for analysis doesn’t work in today’s IoE world. Data is widely distributed, has a short shelf life, or there is just too much of it. Organizations need a new strategy that can get analytics to the data in order to turn data into valuable business insight in real time.
Beyond security to security everywhere. We believe the most effective way to confront today’s dynamic threat landscape, evolving business models and considerable complexity is with security that is embedded into the intelligent network infrastructure, integrates with a rich ecosystem of applications and services, and is pervasive across the extended network - not just networks themselves but all endpoints, mobile and virtual, that extend to wherever employees are and wherever data is…from the beating heart of the enterprise data center out to the mobile endpoint and even into the factory floor.
#11: How do we accomplish all of this…?
Our Enterprise Data Center and Cloud Portfolio …with Cisco and our partners offering products, solutions, and services that span all the domains from data center to cloud and edge/IoT.
To transform the Data Center, we enable a policy-driven infrastructure built around ACI, the programmable fabric, and the programmable network and delivered by our core trio of Cisco UCS, Cisco Nexus, and Cisco ONE to extend data center and cloud fabric., extend ACI policy-driven application profiles to automate provisioning of security in the data center, and ensure ACI becomes TrustSec aware providing software defined segmentation in the data center, and simplifying the provisioning and management of secure access to network services and applications. So that’s the infrastructure components..
With Cisco ONE Enterprise Cloud Suite, which includes Cisco Intercloud Fabric, Cisco offers the next step in cloud software necessary to help you move into private and hybrid clouds by securely expanding your IT assets beyond your premises while maximizing deployment choices, control, consistency, and compliance.
When it comes to cloud, we offer a broad range of consumption models including cloud managed and public cloud options. Our portfolio offerings range from Cisco Metapod (a new way of building and using your private cloud infrastructure with management from the cloud, N9300s + UCS) to Cisco and Partner cloud services from the Intercloud, a globally connected network of clouds built by Cisco and our partners that delivers you unparalleled choice with compliance and control.
And finally, as you move to the edge and the Internet of Things, Cisco Connected Analytics allows you to make the most of the intelligence inherent in all the data, from the data center to the edge. Cisco’s connected analytics strategy, sometimes referred to as Data Analytics 3.0, leverages our cloud, application delivery and emerging software defined infrastructure to push data analysis capabilities to the network edge.
Additional Note: Cisco Connected Analytics gives organizations the tools to take on this data challenge directly. Each analytics package is designed to give organizations across industries access to real-time information, predictions, and trends that can have an immediate impact on their business. In conjunction with Connected Analytics, we offer data virtualization, sophisticated data analytics consulting, and data science services. All three offerings integrate seamlessly across Cisco infrastructure to help you instantly capture, analyze, and interpret critical data at the network edge.
#12: Cisco’s strategy is, and has always been, around partnerships. We believe this provides the customer with the greatest flexibility and choice. In the data center and cloud world, that choice expands tremendously as does our ecosystem.
Let’s start first with the applications partnerships.
Cisco has deep partnerships and joint solutions with critical business application partners to best enable customers to run these applications either on-premises or in the cloud. For instance, Cisco and SAP enable customers to transition to HANA with the UCS Integrated infrastructures on-premises. We’ve also partnered with cloud providers who are certified by SAP for delivery of HANA in the cloud. Customers can choose. As Microsoft customers transition to Windows Server 2012 and SQL 2015, we have both on-premises solutions and are working with Microsoft Azure as part of the Intercloud ecosystem.
Partnerships in Big Data and Analytics are driving the next wave of business innovations. Whether a customer is starting with Hadoop for data management, Informatica and Cisco Data Virtualization for data integration or are jumping into real-time or predictive analytics, Cisco has partnered with the very broad ecosystem to deliver optimized solutions that reduce risk, yield the best TCO and deliver business results faster.
Applications are what is driving the Internet of Things. These apps will control the sensors, gather and potentially process data, and simplify the user and/or customer experience. Cisco is working with the partners that are helping drive new use cases across a wide range of verticals, including manufacturing, health-care and transportation.
Finally, many application developers are simply looking for a platform on which to develop their apps. Whether they are using a DevOps model or simply a cloud development platform (on-premises or off), Cisco has solutions with the partners who enable those platforms.
These applications will run on infrastructure. Customers today will choose whether that application will be owned and operated on-premises or in the cloud. More often, customers are looking for a mix of the two and the ability to move applications from the cloud back on-premises without incurring large re-platforming costs. In the data center, Cisco’s partnerships with storage vendors such as EMC, NetApp and IBM enable the portfolio of UCS Integrated Infrastructures, which accelerate the deployment and performance of any application. We’re also validated across operating systems (Microsoft, Red Hat) and hypervisors (VMware, Microsoft, Citrix, and Red Hat).
Cisco has been a robust Cisco partner ecosystem of Intercloud partners. This ecosystem will allow customers to deploy or consume applications and data from the cloud while also moving the applications between their data centers and the public cloud.
#13: With our portfolio and partner ecosystem, we bring you efficiency by going beyond automation to Policy Driven Integrated Infrastructure
Cisco’s Policy Driven Integrated Infrastructure is powered at its core by Cisco ACI (APIC), Cisco UCS (UCS/M), and Cisco Nexus complemented by Cisco automation and cloud software. This combination not only brings streamlined provisioning, faster workflows, and accelerated lifecycles to the automation of the data center, but can be extended to drive the power of policy-based automation in other directions. Cisco’s Policy Driven Integrated Infrastructure brings to you the ability to build private clouds, to specify and automate security and compliance rules, to establish a common policy across your private and public cloud resources, and to offer customized experiences for your users and and devices at the edge.
The power of policy, the portability of policy, moves the starting point of the discussion from the technology to new business models and how technology can be put to use to drive business value.
#14:
To support today’s continuum of applications ranging from traditional to cloud-native in a fast-moving market, you must be free to choose the optimal consumption model for each workload. In other words, to support a continuum of traditional and cloud native applications, you need a continuum of cloud consumption models that span the range from build to buy. With our portfolio and partner ecosystem, we bring you that continuum and resulting speed by supporting any cloud consumption model with security and data sovereignty.
When it comes to consumption models, your preference when it comes to ownership, management, and location of the IT assets and data / applications will ultimately influence the cloud solution Cisco can help you build or buy. If you want to retain ownership over your IT assets, manage your own private cloud and keep the data on premises, we can help you with our data center and private/hybrid cloud infrastructure offerings.
If you want to retain varying degrees of ownership of your IT assets while shifting management to a third party, Cisco offers a range of ways we can help, from our Cisco Metapod offering to on-demand private cloud services.
And finally, if your consumption model of choice places ownership, management, and location of your IT assets with a third party, we offer cloud services from Cisco and our Intercloud partners.
And across all consumption models, Cisco offers our Professional Services.
Cisco brings you speed and agility by uniquely enabling you to act on your own choices and preferred ways of doing business, making the data center and cloud securely adapt to your consumption models and not the other way around.
----=
Additional Notes:
Cisco gives you tremendous flexibility regarding how you can consume Cloud solutions. Depending on your use case(s) you will have to decide three important elements: (1) Do you need/want to retain ownership of the IT assets associated with your Cloud project? (2) Do you want your IT organization to manage your Cloud environment? And (3) Do you prefer to keep the data and applications on-premises?
These three elements: IT asset ownership, management of the environment and location of data will ultimately influence the Cloud solution Cisco can help you build or buy.
For many businesses, deploying a private cloud environment for all their applications is not necessarily the best path. And IT transformation does not always equal ubiquitous adoption of private cloud in your environment. Furthermore, there are many varieties of private cloud deployment models, including internal private clouds, hosted or virtual private clouds, and managed or outsourced private clouds. Each of these deployment options has very different financial, organizational, and technological implications.
For example, let’s take Private Cloud deployments. If you want to retain ownership over your IT assets, manage your own Private Cloud and keep the data on prem we can help you build your own private cloud.
Conversely, if you want to retain ownership of your IT assets, and you prefer to have a third party manage your private cloud, Cisco can help you do that depending on your vendor preferences. In this case, your sensitive data remains on-prem. This is particularly important for some customers concerned about data privacy. We offer Managed services offerings for private cloud environments and Cloud managed private cloud offerings based on OpenStack such as Cisco OpenStack Private Cloud (ex MetaCloud) depending on your use cases.
Hosted and virtual private cloud solutions are also growing in popularity. These models are well suited to support infrastructure-as-a-service (IaaS) testing and development use cases. With hosted and virtual private cloud solutions, standardized IT services can be efficiently deployed in the public cloud. For IaaS, this single-tenant approach is inherently more secure compared to the multitenant public cloud services that most public cloud providers typically offer.
#15: The final phase of the “journey” is taking your optimized IT infrastructure and your choice of consumption model and applying that more directly to business problems and challenges with the efficiency and speed necessary to take advantage of disruption or be the disruptor yourself in the marketplace. And at the edge, this disruption is drive by applications, and one of the biggest opportunities for IT to add tremendous value, is around Big Data and Analytics. It is important to note that this is an emerging area, so analytics is not the only value that can be provided at the edge, or realized through new and emerging applications – this is just one of the first and perhaps easiest to grasp.
IoE presents tremendous opportunities for organizations to create new value, but capitalizing on this opportunity requires people to reevaluate and evolve how they approach analytics. The impact on application development and even business decisions becomes evident when you consider the possibilities of having access to all that data, whether stored or real-time. The ability to…
Influence a business decision or make a prediction (using long-term data)
Make a decision tomorrow (using short-term data)
Make a decision NOW (using real-time data)
Recall some of the stats early on the presentation – the amount of data measured per person, but also the speed at which IoT devices can generate data.
So today, massive amounts of data are being created at the edge of the network and the traditional ways of doing analytics are no longer viable…You just can’t keep just moving massive amounts of data to centralized data stores – the data is changing too fast, there is a lot of data and it is too distributed…and there is too much of it. As a result, the next phase of analytics involves connecting data generated at the edge with data you store.
#16: The definition of the network has changed over time to include more pieces of the infrastructure. Today we have what we call the extended network, which includes the data center, cloud, endpoints, mobile and IOT environments. You need points of presence across all to work in an integrated fashion to address the problem today’s threats. You need security that is both embedded into the intelligent network infrastructure and pervasive across the extended network.
What does Security Everywhere mean? It means security that is visibility-driven, focused on threats, and a platform approach with:
Sensors everywhere (i.e. telemetry, data, etc.)
Enforcement Everywhere (i.e. controls and systemic response)
Advanced Threat Protection across all attack vectors
Only Cisco has…
…the broadest scope of coverage from the network to the data center, cloud, branch and endpoints
…unmatched visibility to see, control, and protect more as we ARE the network (Inbar to share more on that later)
…integrated security across the extended network, sharing intelligence, information, and capabilities
…the most effective advanced threat prevention - before, during, and after an attack
…Retrospective Security to detect and remediate threat even after attacks
In addition to products, Cisco offers services to help solve customer problems, including Advisory Services, integration services, and managed services.
What this brings
Reduced complexity
Easier deployment
Lower acquisition and maintenance costs (licenses vs addition appliances)
---
Additional Note:
To counter the considerable complexity of today’s IT environments, Cisco embeds security into more control points across that extended network than ever before. Customers can maximize current and future investments by leveraging the Cisco intelligent network infrastructure already deployed to apply threat-centric security with FirePOWER, cloud web security or Advanced Malware Protection from the enterprise network to the data center, mobile, cloud, IoT, and endpoints. This means organizations can minimize complexity with security embedded into the intelligent network, delivering streamlined deployment and cost efficiencies.
Software Defined Segmentation: Customers can use Cisco TrustSec with Cisco Identity Services Engine (ISE) to divide the network into multiple logical zones (segments). Cisco TrustSec is a technology embedded in Cisco switches, routers, wireless LAN controllers and security devices. TrustSec interprets the ISE policy, classifies incoming traffic flows based on identity information, and enforces software-defined segmentation rules across the entire network. This policy grants the right levels of access to the right users/devices while preventing the lateral movement of network threats and, ultimately, limiting the impact of data breaches by containing threats through this software-defined network segmentation.
Customers are able to use their existing investment in Cisco networking because Cisco TrustSec is already available in most switches, routers and firewalls and can be enabled without requiring any additional licensing. This allows customers to extend the visibility and threat detection capabilities from Network as a Sensor with Cisco ISE and Lancope StealthWatch into actual enforcement of security policies.
#17:
Cisco holds #1 or #2 market share positions in policy driven Infrastructure relevant market segments.
In addition, we have a broad and growing ecosystem of business and technology partners whose innovation around Cisco’s market leading and open solutions drive business value for our customers.
Cisco’s Market Leadership
Cloud Applications
• #1 in Web Conferencing SaaS (UC Applications Worldwide, Synergy Research Group, March 2015
• #3 in Worldwide Collaborative Applications Market for 2014 H1 (IDC Woldwide Semiannual Software Tracker 2014 H1, May 2014)
Cloud Infrastructure
• #1 in cloud infrastructure equipment market (Cloud Infrastructure Equipment, Synergy Research Group, March 2015)
• #1 in hybrid cloud infrastructure equipment market (Cloud Infrastructure Equipment, Synergy Research Group, March 2015)
• “Cisco received top overall score for strategy in “The Forrester Wave: Private Cloud Solutions, Q4 2103” by Forrester Research, Inc.
• Cisco and our partners (VCE, NetApp, EMC) are the top three worldwide Integrated Infrastructure market sahre leaders, IDC Worldwide Integrated Infrastructure, 4QCY14
• A Gartner Magic Quadrant LEADER in MQ for Integrated Systems, June 2014
• #2 market share leader in the worldwide x86 blade server market (IDC Worldwide Quarterly Server Tracker 4Q 2014, March 2015)
• 100+ world record benchmark results on Cisco UCS
Cisco Partner Ecosystem for Cloud
• 160 Cloud providers offering Cisco Powered cloud services offering 255 cloud services
• Over 60 parters, 350 data centers across 50 countries in the continuously expanding Cisco Intercloud ecosystem
Open Source and Open Standards
• #1 contributoe to Neutron networking project of OpenStack
• Cisco’s executive is vice-chair of OpenStack board
• Contributor to OpenDaylight, Nova, Snort, ClamAV, Razorback
• Member of Cloud Security Alliance and the Cloud Standards Customer Council
Cloud Consulting Services
• Cisco Professional Services a Major Player Worldwide (IDC, MarketScape: Worldwide Cloud Professional Services 2014 Vendor Analysis. August 2014)
• #1 customer preference for provider of private/hybrid cloud services and cloud professional services (IDC, CloudView 2014: Overview of Results, December 2014)
#21: That opportunity lies in businesses finding ways to disrupt or run the risk of being disrupted. However, for businesses to be able to stay ahead of disruption a broader perspective is required one that goes beyond the traditional data center model.
We must now go beyond the data center to include the cloud, the edge and IoT. It’s a view not limited to just a network topology or architecture discussion, but rather, it is about new business models. When we look at the true disruptors in the market, whether they be Uber, Spotify, Airbnb, or Stripe, they all have a something in common, namely they run their business across all these domains. Yes, they engage their customers in new ways at the edge of the network (through disruptive technologies, applications, and devices), but their businesses are consistently underpinned by a solid foundation built on data centers and cloud.
To leverage all of this new data, digitize their business processes, and realize the IoE $19 trillion opportunity in value by 20201, businesses need to take advantage of this expanded landscape, thus requiring IT to evolve architectures, business, and governance models
________________________________________
1 IoE research: http://ioeassessment.cisco.com/
#22: Cisco’s strategy is, and has always been, around partnerships. We believe this provides the customer with the greatest flexibility and choice. In the data center and cloud world, that choice expands tremendously as does our ecosystem.
Let’s start first with the applications partnerships.
Cisco has deep partnerships and joint solutions with critical business application partners to best enable customers to run these applications either on-premises or in the cloud. For instance, Cisco and SAP enable customers to transition to HANA with the UCS Integrated infrastructures on-premises. We’ve also partnered with cloud providers who are certified by SAP for delivery of HANA in the cloud. Customers can choose. As Microsoft customers transition to Windows Server 2012 and SQL 2015, we have both on-premises solutions and are working with Microsoft Azure as part of the Intercloud ecosystem.
Partnerships in Big Data and Analytics are driving the next wave of business innovations. Whether a customer is starting with Hadoop for data management, Informatica and Cisco Data Virtualization for data integration or are jumping into real-time or predictive analytics, Cisco has partnered with the very broad ecosystem to deliver optimized solutions that reduce risk, yield the best TCO and deliver business results faster.
Applications are what is driving the Internet of Things. These apps will control the sensors, gather and potentially process data, and simplify the user and/or customer experience. Cisco is working with the partners that are helping drive new use cases across a wide range of verticals, including manufacturing, health-care and transportation.
Finally, many application developers are simply looking for a platform on which to develop their apps. Whether they are using a DevOps model or simply a cloud development platform (on-premises or off), Cisco has solutions with the partners who enable those platforms.
These applications will run on infrastructure. Customers today will choose whether that application will be owned and operated on-premises or in the cloud. More often, customers are looking for a mix of the two and the ability to move applications from the cloud back on-premises without incurring large re-platforming costs. In the data center, Cisco’s partnerships with storage vendors such as EMC, NetApp and IBM enable the portfolio of UCS Integrated Infrastructures, which accelerate the deployment and performance of any application. We’re also validated across operating systems (Microsoft, Red Hat) and hypervisors (VMware, Microsoft, Citrix, and Red Hat).
Cisco has been a robust ecosystem of cloud partners as part of the Intercloud ecosystem. This ecosystem will allow customers to deploy or consume applications and data from the cloud while also moving the applications between their data centers and the public cloud.