cis 2014 - fast it: model for digitized economy
TRANSCRIPT
1
© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Fast IT – IT Model for Digitized Economy
Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Internet of Everything is Here
Networked Connection of People, Process, Data, Things
Connecting people in more relevant, valuable ways
People
Leveraging data into more useful information for decision
making
Data
Delivering the right information to the right person (or machine) at the right time
Process
Physical devices and objects connected to the internet and each other for intelligent decision making
Things
IoE
Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Need for unprecedented
performance and Scale
60-80% of all IT Expenditure is Opex
(people, software and facilities)
Need to Simplify Ops
Explosion of applications:
Infrastructure that is
app centric, supports mobility and is secured
Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Virtualization Automation Orchestration
Fast IT for Fast Innovation
Fast IT
Network Compute
Security
Storage
Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Application Centric Infrastructure
Fast IT
Cisco Innovation Powers Fast IT
Network Compute
Security
Storage Nexus & APIC
ACI for the Data Center Fabric
© 2014 Cisco and/or its affiliates. All rights reserved. 6
The Declarative SDN model (Application Centric
Infrastructure a.k.a. ACI)
APIC Controller
Network
Element
Network
Element
State State
Policy Policy
Policy
Policy
Policy
© 2014 Cisco and/or its affiliates. All rights reserved. 7
Policy Policy
APP APP
The ability of the policy to move with the application (When VM moves occur)
Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Application Centric Infrastructure
Fast IT
Cisco Innovation Powers Fast IT
Network Compute
Security
UCS
Industry’s First Application Centric Infrastructure
Storage UCS Integrated
Infrastructure Solutions
Leading a New Market Category
Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
IoE Forces Create New Sources of Computing Demand
Edge-Scale Computing
Connecting to Opportunity
Mobility
IoT
Apps
Location Aware
Rich Media
Connected Sensors
Smart Objects
Branch Office / Remote Sites
Site Operations
Productivity (VDI)
Security / Asset Protection
Shopper Experience
Customer Behavior
Identity Services
Computing Infrastructure
Bare Metal Cloud Virtualized
Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Engine for Analytics Must Be Stronger
Edge-Scale Computing
Faster Decisions Connecting to Opportunity
Computing Infrastructure
Bare Metal Cloud Virtualized
Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Application Architectures Are Changing
Edge-Scale Computing Core Data Center Workloads
Faster Decisions
Cloud-Scale Computing
Deeper Insight
Recommendation Engines
Fraud Detection
Real-Time Price Optimization
Trend Analysis
Big Data Cloud
Online Gaming
Distributed Analytics
Cloud Services
Cloud Content Delivery
Scale-Out Apps
Connecting to Opportunity
Cisco Confidential 12 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Powering Applications at Every Scale
Edge-Scale Computing
Cloud-Scale Computing
Power and Operational
Simplicity in the Data
Center Core
A More Efficient Way to
Power Cloud-Scale
Applications
Customer Needs
1 2 3
Seamless Extension of the
Data Center to the Edge
Cisco Confidential 13 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Application Centric Infrastructure
Fast IT
Cisco Innovation Powers Fast IT
Network Compute
Security
Storage
Threat Centric Security
Cisco Confidential 14 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Security Problem
Changing
Business Models
Dynamic
Threat Landscape
Complexity
& Fragmentation
Cisco Confidential 14 ©2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential 15 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Threat-Centric Security Strategy
BEFORE Discover
Enforce
Harden
AFTER Scope
Contain
Remediate
Attack Continuum
Detect
Block
Defend
DURING
Point in Time Continuous
Endpoint Network Mobile Virtual Cloud
Cisco Confidential 16 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Platform-Based Threat-Focused Visibility-Driven
Strategic Imperatives
Network-Integrated,
Broad Sensor Base,
Context and Automation
Continuous Advanced Threat
Protection, Cloud-Based
Security Intelligence
Agile and Open Platforms,
Built for Scale, Consistent
Control, Management
Endpoint Network Mobile Virtual Cloud
Cisco Confidential 17 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Reduced Cost & Complexity
Threat-Focused
Next-Generation Firewall
Integrates Latest Security
Technologies
Near Real-Time Analytics
Advanced Analytics
And Correlation
Continuous &
Zero-Day Detection
Cisco ASA with
FirePOWER
Services
AMP
Everywhere Managed Threat
Defense
Delivering on the Strategy
Integrated Threat Defense
Cisco Confidential 18 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
CLUS:
AMP
Data Center
Cisco Security Retrospective (2013-2014)
Sourcefire
Acquisition closed
Security for
ACI
RSAC:
AMP Everywhere OpenAppID
Managed Threat
Defense
Black Hat:
2014 MSR & Talos
Cisco ASA with
FirePOWER Services
ThreatGRID
acquired
2014 ASR
InterOp NY:
ISE 1.3 / AC 4.0 / CTD 2.0
EN integrations
Global Security Sales
Organization Security & Trust
Organization
Cisco Security
Solutions Team
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Defense Center
REMEDIATION ACTION
THREAT DETECTED
UPDATE
APIC
Thank you.