fast it. fast innovation.€¦ · i protect my business data and maintain customer trust?...

Post on 22-Jun-2020

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Dave West

Transform your Business in 4 Steps

Fast IT. Fast Innovation.

MANUFACTURING POINT OF SALE ADVERTISING HOTEL

BOOKSTORES TAXI MEDIA RETAIL

Disruption is the New Normal

Customers

Expect

Personalization

Competitive

Advantages

with Data

Analytics

New Business

Models

Disruption Is Everywhere

Mobility

and Device

Explosion

Businesses Reinvented Challenges for Business

Democratization

of Technology

The Network Connects Everything

Create a Secure, Optimized,

Cloud-Enabled Infrastructure

Cloud

How do I cut costs while enabling my business?

Enable a Secure Mobile Workforce

Mobile

How do I create a more engaged and

productive workforce?

Create One-to-One Connections with

Customers Anytime

Social

How can I create

personalised customer

experiences?

Access Distributed Data and Gain Insight to Speed Decisions

Data

How do I make better decisions…

faster?

Protect Valuable Assets and Reputation in Real

Time

Security

How do I protect my business data

and maintain customer trust?

Challenges for IT

Simplify & Increase Performance

Optimise

WAN

Streamline

Operations

Control & Enforce Security

Campus Data Centre

Cloud

WAN

Branch

Personal

The Network Matters

SIMPLE OPEN AGILE SECURE

Transform your Business in 4 Steps

Step 1

Become a Mobile Enterprise

How Relevant is a Mobility Strategy?

56% of CxOs say

mobile strategy is

very or extremely

important to their

business

objectives. IDC Location Based Services: A Promising

Customer-Centric Solution 2014 2014 Cisco Mobility Landscape Survey

The percentage of enterprise apps adapted for mobile are growing from 31%

in 2014 to 42% in

2015.

66% of

Organizations use mobility to increase Customer Satisfaction and Loyalty.

2014 Cisco Mobility Landscape Survey

Empower Your Employees

NETWORK / USER

CONTEXT

How

What Who Where

When

CONSISTENT POLICY ACROSS

WIRED, WIRELESS and VPN

POLICY MANAGEMENT

AND ENFORCEMENT

Identity Services Engine

TrustSec Security

Group Tags

Secure Mobility

Suncash Tea

Engage Your Customers

ANALYTICS

Network Access Presence and Location

Simple Wi-Fi Guest Access Location-Based

Content and Services Mobile Device

Detection

User Experience

DETECT CONNECT ENGAGE

Connected Mobile Experience

Real-Time Location and Heatmaps

Customer Loyalty

Number of People by Venue or Zone

Peak and Dwell Times

Traffic Patterns

Business Relevant Data

Billy Bosworth, DataStax CEO

“Ten years from now… we will be stunned at how uninformed we used to be when we made decisions”

Everything is Connected

Step 2

Evolve to the Next Generation Workspace

How is the Workspace Changing?

Over 75% of

organisations are

supporting corporate

issued mobile devices

and 50% are

supporting BYOD.

2014 Cisco Mobility Landscape Survey

Wireless devices

will account for 66%

of the network exceeding wired traffic

by 2019.

2015 Cisco Visual Networking Index

Support Employees

80% of employees

and customers are

served in

branch offices.

Tech Target, Branch Office Growth Demands New Devices, 2013

The Workspace is Everywhere

Connected Airports

Connected Cities Connected Hospital

Connected Retail

The Workspace is Anywhere

NEXT GENERATION WORKSPACE

Team Collaboration Focus

Increasing Number of High

Bandwidth Mobile Devices

Role-Based Security

CURRENT WORKSPACE

Individual Worker Focus

PC Connectivity Focus

Device and Port-Based Security

Next Generation Workspace

Step 3

Make your Business Agile and Simple

Dreaming of Simplicity?

of Businesses say They Need Cloud Solutions to Quickly

Respond to Business Needs

CIO Insight: “Embrace your Hybrid Operation”

of Applications are Rolled Out Without IT Engagement

Cisco IT Impact Survey 2013

70% 78%

New Approaches to Enable Digital Business

Cloud-Managed IT

Meraki

• Rapid Pace of Digital Business Change

• Simplicity for Fast Growing Organizations

• Zero-Touch Deployment, Cloud Management

On-Premise Managed IT

Prime and APIC EM

• Tried and Tested, Now with ACI

• Broad and Flexible Capabilities

• Next Generation Workspace Enabler

Choice of Consumption Model

ENTERPRISE

MANAGED

CISCO

MANAGED

In-house Control

Up-front Cost

Enterprise Owned Infrastructure

Automated / Optimized

Subscription Model

Cisco Owned Infrastructure

CAPEX OPEX

SERVICE PROVIDER /

PARTNER MANAGED

Automated / Optimized

Coordinated with Others Xaas Offers

Ent. / Sp. Owned Infrastructure

Get Agile User

• Seamless immersive

experience

IT

• Eliminate manual ACLs,

Class and Policy Maps

updates

• APIC-EM dynamically

enforces traffic policies

based on business

priorities

APIC-EM

Dynamic QoS

APIC-EM for IWAN

Intelligent Path Selection

App Prioritization

APIC-EM

Path Visualization

ACL Troubleshooting

User

• Company store opening in

jeopardy

• Preconfigured Meraki

solution delivered

• Immediately store is fully

connected

IT

• Faster, simplified

administration of remote

sites

• Lowered cost by bundling

software across multiple

technologies

Get Simple

Cloud-Managed Networking

Wi-Fi, Switching, Security

IWAN

Intelligent Path Selection

App Prioritization

CMX

Facebook WiFi

Location Analytics

Step 4

Protect your Business

It’s not a question of if, But when organisations will be breached.

The Costs of Inactivity

Highest-Risk Verticals for Malware Exposure in Asia Pacific

Insurance

6x Real Estate and Land

Management

3.5x

Automotive

3.4x Transportation and

Shipping

3.2x

Manufacturing

2.4x

Cyber Attacks

2x more likely in Asia

Security Everywhere

Embedded Security across Extended

Network

The Network as an Enforcer

The Network as a Sensor

Device

Infected!

Go to Self Help

Portal to Resolve

Your access to

the network is

refused or limited

Anamalous

Traffic

Pattern

Detected

NAC Web Agent NAC Web Agent

Your access has

been restored.

Network

As Enforcer

TrustSec

Network

As Sensor

Netflow

Intelligent WAN

Direct Internet Access

with Cloud Web Security

User

• Mobile device gets infected

outside enterprise

perimeter

• Upon re-connecting to

enterprise, anomalous

traffic pattern is detected

• User is redirected to self-

help portal

Get Secure

Fast IT Fast Innovation Business Transformation

The Foundation of Fast IT for Business Transformation

Automation tools

to SIMPLIFY

IT Operations

Extensible and flexible

for CUSTOMISATION

and

PERSONALISATION

Insights and

ANALYTICS for fast

decision making

Network as a Sensor

and Enforcer,

for THREAT

MITIGATION

SIMPLE OPEN AGILE SECURE

Cisco Enterprise Networks

top related