A Better Way Huawei Financial Agile Network Solution Success Cases.

Slides:



Advertisements
Similar presentations
Haga clic para modificar el estilo de subtítulo del patrón © 2012 – Teldat GmbH – All rights reserved „Port Based Security“ – „Drop-In-Mode“ The ideal.
Advertisements

IT’S HERE Bandwidth Technologies. Agenda Technologies for Bandwidth –Single Location DSL/Cable T1/Bonded T1 DS3/OC-N Ethernet Over Copper (EoC, EoFM)
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Tunis, Tunisia, 28 April 2014 Business Values of Virtualization Mounir Ferjani, Senior Product Manager, Huawei Technologies 2.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
VROOM: Virtual ROuters On the Move Jennifer Rexford Joint work with Yi Wang, Eric Keller, Brian Biskeborn, and Kobus van der Merwe
Citrix Partner Update The Citrix Delivery Centre.
MIGRATION FROM SCREENOS TO JUNOS based firewall
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Polycom Conference Firewall Solutions. 2 The use of Video Conferencing Is Rapidly Growing More and More people are adopting IP conferencing Audio and.
Selling Consolidation’s Value. Why Consolidate? Reduce Complexity Increase Productivity Reduce TCO Improve End User Experience Improve IT Performance.
VAP What is a Virtual Application ? A virtual application is an application that has been optimized to run on virtual infrastructure. The application software.
Chapter 1: Hierarchical Network Design
Motorola Mobility Services Platform
1 MICHAEL BANIC VP ENTERPRISE MAKETING. THE NEW DATA CENTER NETWORK.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Neil Sanderson 24 October, Early days for virtualisation Virtualization Adoption x86 servers used for virtualization Virtualization adoption.
FUTURE OF NETWORKING SAJAN PAUL JUNIPER NETWORKS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Firewall Security.
Network security Product Group 2 McAfee Network Security Platform.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Embrace the Future of.
HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionSphere Key Messages – Virtualization, Cloud Data Center, and NFVI.
Huawei e-Gov Public Service Platform Solution Author/ ID/ Zhaozhijuan/ Department: Vertical Solution Marketing Execution Dept., Enterprise.
1 Huawei Confidential Huawei and Cisco Switches Interoperation VOICE  Over 6.5 million Huawei switches are operating on live networks and their good interoperability.
Page 2 Biggest DDoS attack in history slows Internet, breaks record at 300 Gbps 'Biggest cyber-attack in history' slows down internet worldwide after.
Introducing: Chengdu’s Industrial Cloud Huawei & GDS Services Industrial Cloud Solution for SMEs Author/ID: Zhao Zhijuan/ Dept: Industry Solutions.
SendPro is the Easy-to-Use, Online Solution that Simplifies Office Shipping for USPS ®, FedEx ® and UPS ® – Integrated with the Features of Windows 10.
Huawei Products Positioning. The Huawei Switch S12700 is the first agile switch in the world. The S12700 supports native T-bit AC, enables wireless signals.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Enterprise A Better Way enterprise.huawei.com Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate.
How to Make your Networks Smoothly by Using Huawei AR2200 Routers?
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
0 Agile Controller Key Message KM 1: Service Experience-centered Network Redefinition KM 2: Network-wide United Security KM 3: Product Openness and Collaboration.
HUAWEI TECHNOLOGIES CO., LTD. enterprise.huawei.com Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font.
Huawei FusionCloud Desktop Solution Key Message Optimal Experience, Security and Reliability, Agility and Efficiency.
Identify Assess Plan Implementation. Managed Service Providers (MSPs) must use the best and latest technologies on the market to deliver services. IT.
FusionCube At-a-Glance. 1 Application Scenarios Enterprise Cloud Data Centers Desktop Cloud Database Application Acceleration Midrange Computer Substitution.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Designing Cisco Data Center Unified Fabric
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Chapter 1: Explore the Network
Private Cloud Solution for the FSI Success Stories
Instructor Materials Chapter 1: LAN Design
Leading New ICT, Making eFinance More Effective.
Campus Communications Fabric
Optical-Based Switching Solutions
HUAWEI eSight Secure Center Feature Introduction
Microsoft SharePoint Server 2016
How to prepare for the End of License of Windows Server 2012/R2
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Network Function Virtualization Market to reach $70bn by 2024: Global Market.
Design Unit 26 Design a small or home office network
Sizing …today. T: Here’s how. .
Dynamic WAN Selection Optimize Your Business & Cloud Networks
Topic 12: Virtual Private Networks
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Presentation transcript:

A Better Way Huawei Financial Agile Network Solution Success Cases

An Agile Network Architecture to Provide All-round Financial Services CCB (user and department based agile access control) People's Bank of China (admission control + tight coupling of mobile devices) Bank of China (production, office, and Internet access businesses on one network) Agile Converged ABC (two-in-one network, simpler architecture) Secure Everbright Bank (297 million transactions/day, zero security issues) EastWest Bank (1-to-N firewall virtualization, non-blocking data access) Efficient

Converged Network: a Two-in-One Network to Support ABC's Development in Next 5 Years  The current IP network has been running for 7 years and needs reconstruction before a new core business system can be deployed.  Separate production and office networks require double O&M workload, and network expansion results in reinvestment.  One network covers 3 data centers, 5 business centers, and over 20,000 banking outlets, ensuring business transactions and office work of hundreds of thousand staff.  Two networks converge into one, reducing O&M cost by 50% and avoiding reinvestment.  400G routing platform, 64T switching capacity, and good scalability can keep pace with the bank's development in the next 5 years.  Consolidate duplicate functional areas in the production and office networks to reduce the 13 network areas to 6.  Use a " multi-city-multi-center " architecture to provide non-stop service.

Agile Network: Centralized Control, Dynamic Scheduling, Supporting CCB's New Terminal Security Management System  The bank has no unified admission control policies. Any terminals can connect to the bank's internal network.  Different terminal security software programs cannot be installed and maintained uniformly. A unified terminal security management system is required to simplify O&M.  Ensure secure access of 400,000 terminals in 35 branches as well as R&D centers and data centers.  Use natural language instead of complex command configuration to simplify configuration, saving 50% of maintenance work load.  Combine desktop security with network admission control to reduce internal information security risks to zero.  Agile Controller: integrates network admission control, service access, experience guarantee, and terminal security, and dynamically schedules all network resources and security policies.  NGFW works with Agile Controller to control network access rights based on departments and users.

Efficient Network: Use Virtualization Technology to Build an Elastic Data Center for EastWest Bank  As Philippines' fastest growing bank, EastWest Bank wants to build a new data center with high extensibility and good compatibility, which can work with the old data center in redundancy mode.  As the core business system is virtualized, the customer wants an elastic architecture for the new data center.  Upgrade the data center network to satisfy the customer's requirements for high bandwidth and low latency.  Use virtual firewalls to eliminate bottleneck in data transmission.  Apply different security policies to different domains and areas.  Core switches in the service domain use CSS technology to set up a cluster.  Deploy CE6800 data center switches, S series switches, and USG5500 series firewalls on the network.

Secure Network: Anti-DDoS Solution to Safeguard Fast Growing Online Transactions of China Everbright Bank  297 million transactions a day: night market, online banking, payment guarantee.  The bank has the best network devices and application architecture, but still suffers severe packet loss.  The HQ information system requires level-3 information security.  Safeguard 297 million online transactions a day, with zero security issues caused by DDoS attacks.  Significantly increase online transaction speed while conserving egress bandwidth.  Strengthen data center protection system, enabling the HQ information system to pass Level-3 security assessment.  Separate detection system from control system and deploy a bypass traffic cleaning center, without changing network topology.  Deliver a protection system capable of defense against 100+ types of DDoS attacks and L2-L7 attack detection.

A BETTER WAY Openness, Cooperation, Innovation, Win-Win