Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device - securely, reliably, and seamlessly. It is built on an infrastructure of scalable and resilient hardware and software. Components of the architecture come together to build network systems that span your organization from network access to the cloud. Intelligent network, endpoint, and user services provide the flexibility, speed, and scale to support new devices, applications, and deployment models.
The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider's ability to offer services to Enterprises, Governments, and Consumers will be addressed in this webinar. We will talk about the importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting your businesses today. We will also detail service delivery and consumption on the three 'service horizons,' (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud).
2. CONSUMERIZATION CLOUD & VIRTUALIZATION RICH COLLABORATION
Bring Your Own Device Access to Anything, Anywhere Rich Video & Social Media
Person To Wait For Page To Load
Before Navigating Away
8 secs
5 secs
3 secs
2000 2005 2009
User Experience Networks Drive
Drives Business User Experience
Impact
3. PUBLIC
CLOUD
THE NETWORK
Customers Service
Provider
PRIVATE
CLOUD
Uncontrolled Public & Diverse, Rich,
Device + Private + Collaborative
Proliferation Cloud Applications
We are at an Inflection Point
5. Abstract
• The impact of the consumerization of IT and mobility
cannot be understated. The impact that these two key
business elements have on the evolution of Enterprise
Architecture and for Service Provider’s ability to offer
services to Enterprises, Governments, and Consumers is
addressed in this webinar. The importance of the shift
and movement of the secure network edge leads to a
very close examination of the changing threat vectors
and vulnerabilities impacting our businesses
today. Service delivery and consumption on the three
“service horizons,” (Mobile Endpoint and CPE, Virtualized
Network Edge/Data Center Edge, and the Cloud) is
detailed.
6. Visibility and Control
Building a Secure Infrastructure for Profitable Services
Total Visibility
in all aspects of
your network.
Complete Control
Guaranteed Availability over all traffic in
of all services. the network &
cloud.
7. Visibility & Posture
Endpt / CPE ACCESS/AGGREGATION CORE DC/CLOUD
Public, Private
& Hybrid
PE(s) Clouds
L2 Agg. P P
Mobility
PE
DSL Internet &
Fixed P
Peering Edge
Wireless
P
Cable P P
Enterprise
Multi-Tenant Access and
Access and aggregation:
CPE:
Full Service Branch Basic infrastructure Operations andData Center/Cloud
Data/Service
• Firewall
Security
• aggregation: Services
• Session role
security Border Controller Center
• IDS • Firewall
• Control Plane Security
• Encryption (IPSEC
IPSEC & SSL VPN • IDS/IPS Plane Security
•
Host Security
& SSL) & Data
•Security MonitoringIPSEC VPN
Management VA PT Web Assessment & SSO MNAC
• Firewall Telstra Cloud:
• Trust & Identity
Control Plane • BNG (Subscriber Controls)
IDS/IPS • Nexus Center:
Service 1kV (Netflow/VSG)
• Email Security
Security • SSL VPN
IPSEC VPN • Remediation (quarantine)
• UCS: Software based Security
• Web/Content
Forwarding Plane Securityand Identity
• Trust Operations Center
DHCP—subscriber • Services (FW, VPN,Services
One Time …)
Intrusion Detection/Prevention
Security • Web/Content Security
SSL VPN • Nexus 7k Security Services Mod
• VM Security & Nexus 1000V
• NAC Security
Email • Email and Identity
Trust Security • Anomaly
• vWAAS detection/Scrubbing
• WAN Optimization
Web/Content Security Experts SOC Processes Plane Toolsets
• DLP
Web/Content Security • Policy Control SOC
• Enterprise-Hosted Ironport
Security • Email Security • Web/Content/Email Security/DLP
Firewall & XML Firewall
• NAC • Scansafe Web Security
• Web/Content/Email Security
SIO, Platform Telemetry, 3 rd party rules and systems, Regulatory Policy & Influence
• Identity/Policy Service Control