intent-based networkingeventinfo.co.kr/2017/cisco_0919/presentation_total/... · 2017. 10. 10. ·...

29
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Intent-based Networking Powered by Cisco Digital Network Architecture Dave West Vice President, Worldwide Enterprise Networking Sales 19 September 2017

Upload: others

Post on 27-Jan-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Intent-based NetworkingPowered by Cisco Digital Network Architecture

    Dave West

    Vice President, Worldwide Enterprise Networking Sales

    19 September 2017

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Retail Healthcare Education

    Transportation Finance Government

  • The Network is the Cornerstone of Digital Success or Failure

  • Scale Complexity Security

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Intent-based Networking with Cisco

    Digital Business

    Intent Context

    Security

    Learning

    Network

    Powered By Intent. Informed by Context.

    SecurityMobile IoT MultiCloud

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Cisco’s Intent Based Networking

    Shift IT Time to Business Focus

    Network Provisioning Time Savings

    67%

    Improve Issue Resolution

    80%

    Reduced Security Breach Impact

    48%

    Reduced Operating Expense

    61%

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Business Imperatives

    How do you defendagainst threats?

    How do you scale for the mobility & IoT

    explosion?

    How deliver a great user experience?

    How do you manage across a multi-cloud

    world?

    Security Scale Assurance Cloud

    Ransomware IoT Mobility SaaS

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Security

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Data

    Ava

    ilabili

    tyEvolution of Security Threats

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Secure Segmentation and Onboarding:Software Defined Access

    Completely Automated | Policy follows Identity | Minimize Lateral Threat Movement

    Guest Virtual Network

    Group 5 Group 6

    IoT Virtual Network

    Group 3 Group 4

    Employee Virtual Network

    Group 1 Group 2

    Users

    Devices

    Apps

    Drag policy to apply

    IT Simplicity

    • No VLAN, ACLs or IP Address management required

    • Single network fabric

    • Define one consistent policy

    Security

    • Simplified Micro-Segmentation

    • Policy enforcement

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Seeing and Acting on ALL Threats

    How Do You Provide Security While Maintaining Privacy?

    Encrypted Traffic

    Non-Encrypted Traffic

    of organizations are victims of malicious activity*

    80%

    of attacks used encrypted traffic to evade detection*

    41%

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Machine Learning Identifies Malware Infrastructure view of the data

    Google Search

    Firefox self-repair

    Bestafera Malware

    Encrypted Traffic Analytics

    Malware in Encrypted Traffic

    Security AND Privacy

    Detection: 99.99% Accuracy

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    IoT

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    ‘Shadow’ Internet of Things Coming to Every Business

    63M network connections per second by 2020

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Automate IoT Deployments at ScaleSoftware Defined Access

    Box by BoxManual | Error Prone

    AutomationScalable | Simple

    Mass Scalability | Users, Device & IoT Segmentation | Policy-based Automation

    2from hours

    to 15 minutes4from hours

    to 5 minutes5from hours

    to 5 minutesProvisionDesign Policy

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Comparison of Total Workflow Time

    The Old Method The New Method

    Total Workflow for One DeviceFifty Devices

    25minutes50days11hours

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Assurance

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Where is IT Spending There Time?

    Finding the Source of an issue, is a complex, end-to-end problem

    WAN

    Office Site Network Services DC

    Client Density

    Client Firmware

    AP Coverage

    RF Noise/Interf.

    WLC Capacity

    WAN QoS, Routing, ...

    WAN Uplink Usage

    Authentication

    End-User Services

    Configuration

    Addressing

    Impacts Join/Roam

    Impacts Join/Roam

    Impacts Quality/Throughput

    Impacts Both*

    Impacts Both*

    Impacts Both*

    Impacts Both*

    Impacts Both*

    Impacts Quality/Throughput

    Impacts Quality/Throughput

    Impacts Join/Roam

    APs

    Local WLCs

    ISE

    DHCP

    Mobile Clients

    CUCM

    Prime

    43%Of IT time spent troubleshooting;

    #1 consumer of time

    Source: Cisco DNA Customer Survey, June 2016

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Office Site Network Services DC

    WAN

    Local WLCs

    APsMobile Clients

    DHCP

    CUCM

    NMS

    The Best Data: End-to-End Assurance

    SFCDC

    SNOW

    BOX

    Cloud Apps

    On-boarding & connectivity

    Configuration compliance

    Visibility & performance

    Network health

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    IT Services Leader Case Study

    Challenge• Invest in digital to improve experience

    • Deliver to services faster to open revenue streams

    • Simplify through hyper automation

    Business Outcomes• Time-to-Market: move resources faster,

    from 1 week to minutes

    • Workforce Mobility: policy follows users

    • Client security & data privacy maintained through segmentation

    • SaaS Simplicity: higher 0ffice 365 uptime New Resource Deployment

    One week to minutes

    Solution: Cisco DNA Center, ISE and Catalyst 9K

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Global PharmaceuticalCase Study

    Challenge• Enable researchers across 5 companies

    to collaborate

    • Maintain security policy

    Business Outcomes• Cost Savings: consolidate 5 companies

    in new site to 1 network

    • Simplified Segmentation: Easy to maintain groups and policy

    • Employee Productivity: Increased collaboration across researchers over high performing WiFI

    Secure Collaboration

    Five companies & one network

    Solution: Cisco DNA Center, ISE and Catalyst 9K

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Cloud

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Innovations Overwhelming the WAN

    Data Center | IaaS

    SaaS | vDC

    Expensive Bandwidth

    Up to 30%Infra spend in WAN

    Device Proliferation Apps Moving to Cloud

    Millions of connections every second40% 20x 4x

    WAN OpExSavings

    Improved ApplicationExperience

    MoreBandwidth

    Viptela Advantage

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Cisco SD-WAN

    DC

    IaaS

    SaaS

    vDC

    Need Simplicity, Lower Cost, Application Experience

    Users

    Devices

    Things

    Applications

    AnalyticsCloud Delivered

    Top Use Cases: • SD-WAN• Cloud Onramp

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Viptela Integration Plan

    Support and Scale the current sales motion

    Viptela SD-WAN on strategic ISR platform

    Deliver end-to-end experience with full DNA integration

    Deplo

    yment

    Scenarios

    Benefits

    vEdge ISR4K + vEdge SW

    DNA Center

    + SD-WAN

    ISR4K + vEdge SW

    vManage

    vEdge

    vManage

    vEdge

    Platform IntegrationNo Integration Management Integration

    Phase 2Phase 1 Phase 3

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Global RetailerCustomer Story

    Challenge• Reduce OpEx and CapEx costs across

    1600 stores

    • Re-energize customer in-store experience

    • Improve mobile application performance

    • Securely manage 7 segments

    Business Outcomes• 26x Bandwidth improvement

    • 5x Improvement store conversions

    • $20M Saved over 3-years

    Reduction in WAN Costs40%

    Solution: Cisco SD-WAN (Viptela)

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    Cisco Intent Based-Networking Solutions

    Users Devices Apps

    Connecting Trusted Users to Trusted Devices with an Uncompromised Experience

  • © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

    THE SECURE, INTELLIGENT PLATFORM FOR DIGITAL BUSINESS