Download presentation
Presentation is loading. Please wait.
1
CISCO KNOW THE NETWORK Good morning –
I’d like to share with you Cisco Know the Network solution. 1
2
Your Business Priorities
What Customers are Saying Business Risk Management Architecture Planning for Business Growth Financial Management Improve Business Performance
3
What are Top-Of-Mind Concerns for IT Managers?
What devices are deployed in our network? Is our network technology current?4 Is our support coverage in place to ensure maximum network availability? Downtime1 Security breaches2 Performance issues3 ? What are top-of-mind concerns for IT managers? Downtime* -Security breaches** -Performance issues *** Is our network technology current? **** What devices are deployed in our network? Is our support coverage in place? * Netcordia, 2007 ** EUNIS, 2005 and Infonetics Research, 2005 *** Vanson Bourne, 2006 **** CompTIA, 2008 ============================================================= What do IT managers worry about most? According to various surveys, number one is downtime– 91% of IT managers have cited downtime as their biggest headache, according to a Netcordia survey of 100 users. According to market research specialist Infonetics, large enterprises typically lose anywhere from 2 percent to 16 percent of their annual revenues because of losses associated with network downtime--the average loss is 3.6% of annual revenue (Infonetics Research, 2005) - Another top concern is security breaches, which can be a huge liability, ranked as the number one concern in an EUNIS survey. One-third of the 934 IT staff and managers who responded to its survey said securing communications lines and data is their main networking challenge (CompTIA); Another top-of-mind concern is poor network performance Nearly 60 per cent of IT directors regularly worry about network performance problems, according to a Vanson Bourne survey. A study of over 300 IT managers by research company Vanson Bourne found that 57 per cent of respondents are concerned about the speed of their current networks and this is triggering plans to upgrade infrastructure. The survey found that 60 per cent of respondents plan to upgrade networks in order to increase network performance in the new year. Other top-of-mind issues for IT managers: Is our network technology current? (CompTIA, 2008) =================================================================== EUNIS survey: Rank 1 Network Security 2 Strategic Approach to Infrastructure 2 Enterprise Portals 4 User Management 5 Anytime, anywhere computing 6 Network Technologies 6 IT Institution's planning 8 Systems resilience and availability 8 Information Security 8 Data interfaces Network Security • Hacking, SPAM, computer viruses; • Firewalls, intrusion detection; • Identification of security breaches; • Authentication for use of data network; x and other mechanisms; • Potential conflicts between open network access (to provide wide access to facilities) and security of access; • VPNs. ============================================================ Vanson Bourne, 2006 According to research conducted by the Gartner Group, summarized in Figure 1, the failures within the network infrastructure contribute less than 20 percent of the downtime experienced by the typical enterprise. Operator errors and application failures account for the remaining 80 percent. Top 5 Network Concerns Of IT Pros (CompTIA, 2008) “Having current network technology was fourth.” EUNIS Survey: According to market research specialist Infonetics, large enterprises typically fritter away anywhere from 2 percent to 16 percent of their annual revenues because of losses associated with network downtime. This translates into tens of millions or hundreds of millions of dollars annually. Increasing network availability is an important business issue, with tolerance for network downtime steadily decreasing. According to an earlier Infonetics Research study, large businesses lose an average of 3.6 percent in annual revenue due to network downtime each year. Outages attributable to network equipment generally fall into one of three categories: planned maintenance events, system errors, or human factors. Networking vendors typically focus on the first two, but the last one, human factors, is the biggest contributor—responsible for 50 to 80 percent of network device outages. [Infonetics Research's latest study, "The Costs of Enterprise Downtime, North American Vertical Markets 2005," 230 companies with more than 1,000 employees each from five vertical markets - finance, healthcare, transportation/logistics, manufacturing, and retail - were surveyed about their network downtime.] A recent study of technology decision makers shows how important it is to investigate the factors that affect network downtime. The Strategy Group conducted a survey in July, 2007 that included 173 respondents from Ziff Davis Enterprise database. These were all manager level or higher working in organizations with more than 100 employees. This group demonstrated the increasing lack of tolerance for network downtime. Almost 1/3 (32 percent) said that they had zero tolerance, and the average response of the group was just 1.8 hours. This is easy to understand when the average cost of an impaired network was estimated at $3 million per day, with 10 percent giving an estimate of more than $10 million in damages and lost revenue per day. Some 91% of IT managers have cited downtime as their biggest headache, according to a Netcordia survey of 100 users. When questioned on the number of hours of downtime experienced, 25% of IT managers reported an excess of five hours each month. 1 Netcordia, 2007 2 EUNIS, 2005 and Infonetics Research, 2005 3 Vanson Bourne, 2006 4 CompTIA, 2008 3
4
Network Risks 43% of network equipment examined at 150 major companies is already at end of life!1 – End of life equipment typically costs more to maintain and is more prone to downtime1 Average cost of downtime is $42,000 per hour, and up to $6.5M per hour for certain applications and industries2 Average annual downtime cost has been estimated at 3.6% of the revenue of large enterprises3 What’s in your network? 43% of network equipment examined at 150 major companies is already at end of life! * End-of-life equipment typically costs more to maintain and is more prone to downtime * Average cost of downtime is $42,000 per hour, and much higher for certain applications and industries--$6.5M per hour for brokerage firms for example ** Average annual downtime cost has been estimated at 3.6% of the revenue of large enterprises *** * Dimension Data Survey, 2009 ** Gartner Group, 2004, 2005 *** Infonetics Research, 2005 ============================================================= End-of-Life equipment 43% of all Cisco network equipment reviewed is at End-Of-Life, in one study of 150 major companies! * End-Of-Life equipment typically has limited functionality, due to software incompatibilities Equipment at end-of-life costs more to maintain, and is more prone to downtime * (Dimension Data, 2009) Average cost of downtime is $42,000 per hour ** But an hour of downtime can cost much, much more for companies that rely heavily on network technology. For example, downtime costs brokerage firms $6.5 million per hour and credit card authorizers $2.6 million an hour (Gartner Group, 2004, 2005), and $660,000 per hour for supply chain management applications (Alinean, 2004). Downtime typically costs large enterprises an average of 3.6% of their annual revenue *** According to market research specialist Infonetics, large enterprises typically lose anywhere from 2 percent to 16 percent of their annual revenues because of losses associated with network downtime--the average loss is 3.6% of annual revenue (Infonetics Research, 2005) NOTE: See slides in Sales Reference Section for more details. 1 Dimension Data Survey, 2009 2 Gartner Group, 2004, 2005 3 Infonetics Research, 2005 4
5
Impact of Poor Network Performance
Hard factors Lost business (1) Missed SLAs (2) Employee productivity (3) Brand impact (4) Missed business opportunity (5) Soft factors Time We can look at the impact of poor network performance which range from the hard factors of lost business and employee productivity (which can be fairly easy to identify and quantify) … …to the softer aspects which include negative impacts on brand image and value ; and also missed business opportunity. Eg, 0.1% downtime = 8.8 hours/annum; $135K in a $135M/annum business Compensation cost ; risk to future business Impact of lower performance network or partial failure : Eg US$135K/employee/year ; employees ; 30 mins/week = $1.7M/annum Brand impact: % increase in good word of mouth = $16M extra sales ; 1% reduction in bad word of mouth = $49M extra sales (Ogilvy) Missed business opportunity: Lower agility ; longer deployment time. IT becomes the critical path.
6
Advantages of Implementing Network Lifecycle Management
Lowers business risk through reduced network downtime Problem anticipation & avoidance Provides IT cost savings and increased productivity Network transparency Balancing performance & cost Prepares for new ICT technologies and applications Improves competitive advantage through better business support information On the other hand, having a sound approach and well defined network lifecycle management strategy will create true value for your business. IDC identifies these advantages of implementing network lifecycle management in a whitepaper which was commissioned by Cisco and is based on the findings of IDC from across their existing customer research. Source : Gain a Competitive Advantage Through Better Performance of Your IP Network. IDC, October 2009
7
We have a solution that will address your business priorities and challenges – Know the Network or KTN.
8
What is Know the Network (KTN)?
KTN provides network inventory reports containing uncovered items, Last Date of Support (LDoS) items, contract status, and site information. KTN is embedded in some existing Cisco programs or may also be offered as a one-time event. The Know the Network (KTN) solution is a set of business capabilities for collection-led, intelligent installed base management. KTN helps you make informed decisions about your network in regard to risk, performance, and financial management. The Know the Network (KTN) solution is a set of business capabilities for collection-led, intelligent installed base management. KTN helps you make informed decisions about your network in regards to risk, performance and financial management. KTN provides network inventory reports containing uncovered items, Last Date of Support (LDoS) items, contract status and site information. KTN is embedded in some existing Cisco programs or may also be offered as a one-time event.
9
KTN Business Benefits Business Outcome Business Benefit
Achieved by These KTN Deliverables Greater ability to assess and manage business risk • Reduced risk of network outages • Increase network availability and reduce mean time to restoration • Greater business confidence through improved network intelligence • Ability to measure cost vs business risk for entire network • More effective mitigation of network threats • Accelerate time to market for the your own services • Obtain smooth and timely access to Cisco support resources • Identifying critical devices that are reaching or have passed last date of support (LDoS) • Identifying any security issues or possible vulnerabilities in the network are not covered by service contracts and addressing risks involved • Detailed understanding of installed base • Upgrading hardware and software • Updating and correcting service contract data which minimizes entitlement issues
10
KTN Business Benefits Business Outcome Business Benefit
Achieved by These KTN Deliverables Improved business performance • Link technology goals to business goals • More effective network architecture planning for business growth • Accelerate time to market for your own services • Optimization of network performance to meet business needs • Quicker return of investment (ROI) through faster IT infrastructure project deployment • Detailed view of Cisco and third-party devices • Analysis of current devices in the network, including Cisco IOS Software release and product lifecycle status • Refreshing LDoS equipment • Adopting new technologies quicker • Offering a network view vs device view
11
KTN Business Benefits Business Outcome Business Benefit
Achieved by These KTN Deliverables Improved financial management of network assets • Improved network lifecycle management and planning • Better asset management for taxation, accounting and compliance • Greater ability to budget for network expansion and improvement • Improved budget planning for other network expenditures • Serves as an inventory management tool for your internal management reporting • Reduce total cost of ownership (TCO) associated with downtime and equipment maintenance • Identifying devices that are reaching or have passed LDoS • Complete asset register of Cisco devices, giving comprehensive network view • Improved service contract management • Refreshing LDoS equipment • Identifying devices that are not covered by service contracts and addressing risks involved • Identifying host names, locations and IP addresses of devices • Cisco IOS Software rationalization
12
Critical Questions to Consider
1 Do you have multiple sites and complex networks? 2 Are you concerned about hidden risks in your network? 3 Do you want to know what is in your network and take steps to ensure your devices are adequately covered in terms of service and support? 4 Do you want to perform a network refresh or migrate to new technologies but do not have a baseline inventory of current equipment? 5 Are you expanding your business and want to determine enhancements needed to meet your business growth? If your answer is Yes to one or more of the following questions, KTN is a key enabler for you to achieve your business objectives: Are you a large enterprise or service provider customer with multiple sites and complex networks? • Are you concerned about hidden risk areas in the network? Do you want to know what is in their network inventory and would like to take steps to ensure they are adequately covered in terms of service and support? Do you want to perform a network refresh or migrate to new technologies but do not have baseline inventory of current equipment? Have you undergone or are you going through mergers and acquisitions – do you want to understand your installed base to consolidate or audit all your network assets for all the merging entities? Are you expanding your business and would like a network assessment to determine network enhancements required to meet your business growth? The customer is moving to a different location and would like to obtain a detailed inventory of your equipment. Do you want to rationalise the number of resellers you are dealing with? Do you want to review the installed base to determine which resellers are providing support for which devices? 6 Are you going through mergers and acquisitions? Do you want to consolidate or audit your network assets? 7 Are you moving to a different location and would like to obtain a detailed inventory of your equipment? 8 Do you want to review your installed base and rationalize the number of resellers you are dealing with?
13
KTN Process Pre KTN Assessment KTN Assessment Post KTN Assessment
Tracking Customer introduction • Mutual agreement Pre-assessment information exchange Partner training (if applicable) Install network collector • Perform network discovery • Collected data sent to Cisco for validation • Download inventory report for analysis Review inventory report Identify issues, changes or actions needed Determine and develop action plan Explore options for technology migration or product refresh Identify actions for support coverage and contract updates • Partner implements required solutions Partner provides services for regular assessments and network lifecycle management This is how the KTN process works. Pre KTN Assessment In the Pre KTN Assessment phase, we introduce the value and benefits of KTN to our customers. If the customer decides to go ahead, we take the steps needed to formalize a mutual agreement. We will exchange some information that may be required in order to carry out the KTN network assessment. KTN Assessment The work done during the KTN Assessment phase is performed by the partner in collaboration with Cisco. We install the network collector and perform the network assessment on-site. The network data collected is then sent to Cisco for validation, for example, validating the product ID and serial number of the devices with Cisco records. A network inventory report is generated by Cisco which the partner downloads the report for further analysis and assessment. Post KTN Assessment We will review the network inventory report together, and work closely together to identify the risk areas or issues that have business impact and ways to address them. We can utilize the data to assist with your network architecture planning. We will discuss about the current status of the network and the desired future state. We can also explore the options to optimize your network performance or support your business growth – this includes product refresh, migration solutions, adoption of new technologies and what it takes to prepare your network for business transformation. We will also make the changes needed to your service contracts to make sure they are up to date and correct. We will also agree on the actions needed to help ensure your network devices has the appropriate support coverage needed for maximum network availability. Tracking In the Tracking phase, as your partner we deliver the solutions you need to meet your business objectives. We also provide service offerings that will enable regular network assessments to be done on the customer’s network and other network lifecycle management functions. Partner, Customer Partner, Cisco Partner, Customer Partner, Customer 1 week 1 week 3-4 weeks Ongoing Average six-week engagement (based on size and complexity)
14
Frequently Asked Questions
Will the KTN network collection process: Compromise our network security? Affect our network performance? The KTN network collection process uses a strictly read-only application. It does not modify any part of the network or change any configuration details. The collected network data transmitted to Cisco is encrypted. Only very small amounts of data are being collected. The network bandwidth used and network traffic generated are negligible, so the effect on network performance is miniscule. Q. Will the KTN collection process compromise our network security? The KTN collection process uses a strictly read-only application. It does not modify any part of the network or change any configuration details. The collected network data transmitted to Cisco is encrypted. Q. Will the KTN network collection process affect our network performance? A: Only very small amounts of data are being collected. The network bandwidth used and network traffic generated are negligible, so the effect on network performance should be miniscule.
15
Frequently Asked Questions
What happens to our network data that Cisco analyzes to produce a network inventory report? Data collected during the course of a KTN engagement follows all established global Cisco security and privacy protocols as outlined in the Cisco Systems Inc. Online Privacy Statement. Cisco does not share collected data with any third party, unless given prior written consent from the Cisco reseller or end customer. All data is transmitted from the network to Cisco using industry standard encryption. All data is handled behind a Cisco IT firewall, and is protected in the same manner as all other business critical Cisco data. All network collection data is maintained on an internal Cisco server with licensed virus protection software. Access to any network collection data is limited solely to Cisco account teams servicing the reseller/customer and/or the reseller leading the KTN engagement. Customers, of course, are free to share their data with others as they choose. During report processing, access to the network collection data is limited to Cisco. employees necessary to the creation of the network inventory report. These employees access the data strictly through Cisco’s secure servers. Q. What happens to our network data that Cisco analyzes to produce a network inventory report? A: Data collected during the course of a KTN engagement follows all established global Cisco Security and Privacy protocols as outlined in the Cisco Systems Inc. Online Privacy Statement at In summary, this means: Cisco does not share collected data with any third party, unless given prior written consent from the Cisco reseller or end customer. All data is transmitted from the network to Cisco using industry standard encryption All data is handled behind a Cisco IT firewall, and is protected in the same manner as all other business critical Cisco data. All network collection data is maintained on an internal Cisco server with licensed virus protection software. Access to any network collection data is limited solely to Cisco account teams servicing the reseller/customer and/or the reseller leading the KTN engagement. Customers, of course, are free to share their data with others as they choose. During report processing, access to the network collection data is limited to Cisco employees necessary to the creation of the network inventory report. These employees access the data strictly through Cisco’s secure servers.
16
Frequently Asked Questions
Is there a list of third-party vendors and devices that the KTN collection process can report on? When third party devices are discovered, what information is reported? One of the current KTN network collectors will discover devices of all vendors as long as they support Simple Network Management Protocol (SNMP). The current KTN network collector does not report on service coverage, product security alerts (PSIRTs) or field notices for third-party devices. End-of-life milestones are provided for some third-party devices including those from Nortel (now Avaya) and Juniper. With most of the vendors, it will discover information based on generic MIBs, such as IP and MAC addresses, and system description. With entity MIB supported equipment it will discover cards, ports, and so on. With Cisco and, to some extent, Nortel, Juniper, and HP (ProCurve), it will also discover internal device configuration, memory used, configuration files (Cisco device only), and some other data that is stored in the vendor private MIBs. A: The current KTN network collectors (Netformx DesignXpert/Netformx Network Discovery) will discover devices of all vendors as long as they Q: Is there a list of third-party vendors and devices that the KTN collection process can report on? support SNMP (Simple Network Management Protocol). Q: When third-party devices are discovered, what information is reported? A: Netformx DesignXpert/Netformx Network Discovery does not report on service coverage, product security alerts (PSIRTs) or field notices for third-party devices. End-of-life milestones are provided for some third-party devices including Nortel (now Avaya) and Juniper. With most of the vendors, it will discover information based on generic MIBs, such as IP and MAC addresses, and system description. With entity MIB supported equipment it will discover cards, ports, etc. With Cisco and, to some extent, Nortel, Juniper, and HP (ProCurve), it will also discover internal device configuration, memory used, configuration files (Cisco device only), and some other data that is stored in the vendor private MIBs.
17
Frequently Asked Questions
Will the KTN network collection provide information on items in the network that are supported or managed by another Cisco partner? To protect partner proprietary information, Cisco has implemented procedures so that partners have visibility to information in network inventory reports that pertains only to the contracts registered to their Cisco.com user ID. If the network collection is done by Partner A, the serial number product ID, and item type of the devices managed by Partner B are provided. Service contract-related information is blocked and replaced with “Other” when a device is covered by a service contract not registered to the partner’s Cisco.com User ID. Q: Will the KTN collection provide information on items in the network that is supported or managed by another Cisco partner? A: If the KTN collection is done by Partner A, the serial number and product ID of the devices managed by Partner B are provided. The report will indicate a specific device is covered but will not reveal which company it is covered with. It won’t provide any contract details at all.
18
Business Transformation
Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/ Operating Expense Forrester did an interesting survey across 600 business execs and 506 IT execs, where they asked them to prioritize their top concerns. When they did so, we looked at the results and categorized them into two areas: One was about customer experience and innovation ,and the other was all about productivity and lowering operating expenses The number one thing of importance to our customers was “How do they acquire and retain customers?” … The number two – there were two tied for #2 – was how do they manage customer relationships, and how do they lower operating costs? From this, it’s clear that to achieve these objectives requires [click] BUSINESS TRANSFORMATION - changing the business model and the dynamic. And fundamentally the key change is putting the interaction where the customer is. This involves changing the way you connect to customers and partners/suppliers, as well as how your employees connect with one another. Acquire and retain customers 1 2 Manage customer relationships 2 Lower company operating costs Drive innovative new market offering/ business practices Improve workforce productivity Improve quality of products and services Support globalization Source: Forrester Report “State of the CIO Agenda” January 2009: 600 Business/506 IT Executives
19
Business Transformation: The New Borderless Organization
Anyone Employee, Partner, Customer Communities Person to Person, Person to Device, Device to Device Anything Borderless Experience As enterprises around the world are rapidly becoming borderless there is a need for anyone, anything, anywhere to be connected anytime. Increasingly, the employees, partners and customers as well as devices and applications are connecting at home, in the hotel and on the train. They expect the same productivity, the same access to the information and the same responsiveness. We call it the borderless experience. The vision of Borderless Networks is delivering that connectivity to anyone, anything, anywhere, anytime -- And doing so securely, reliably, and seamlessly. The key to the vision is the network – it’s is the unifying element that will enable that seamless connectivity. Let’s see how the Borderless Network vision is delivered. Securely, Reliably and Seamlessly Always Works, Instant Access, Instant Response Work, Home, On the Go… Anytime Anywhere 19
20
Borderless Networks Infrastructure New Innovations
Architecture for Agile Delivery of the Borderless Experience New Innovations Borderless End-Point/User Services Mobility Workplace Experience Video AnyConnect Borderless Network Services Security: TrustSec Performance Video: Medianet Green: EnergyWise Borderless Management and Policy The diagram you see on the slide outlines the main components of the borderless networks architecture which links users, devices, applications, operational processes and the network. It serves as both a framework for our system and architecture roadmap as well as the deployment blueprint for Borderless Enterprises. Let me briefly walk through its main elements. The Borderless Networks architecture is anchored around policy and connection management which create the framework for the delivery of user and network services across products, technologies and networks. The role of the Connection Management at the bottom is to provide users and devices with a consistent, seamless and secure connection to the borderless network and its capabilities, no matter where they are – on premise inside the enterprise or off premise in the hotel, home, on the train or in the car. The connection manager is always on and location aware. For example, when a user is on a campus network behind the firewall, the connection manager would use .1x authentication and connect the user to the corporate wired or wireless network. When a user closes their laptop and goes home and open the laptop again, the connection manager preserves the session state, automatically finds the optimal attach point and resumes the connection with no involvement from the end user. The next level up are borderless user services. These services, even though they are the functions of the network, define the actual user experience. The three services most relevant to the end users are mobility, performance and security. Borderless Mobility is the capability of the network to provide seamless experience across multiple networks for users and devices on the go. The Borderless Network takes into account the unique attributes of each of the devices, network locations, and transport medium. It provides end-users with constant connectivity by choosing the optimal network at any given time based on the network availability, service conditions, bandwidth, and network cost, all in the background and transparent to the user. In addition, location and presence become key policy attributes determining information portability and services available to the end-user. Next, Borderless Performance. By combining the visibility and control capabilities imbedded in the network fabric with the optimization and acceleration capabilities at the natural congestion points, Borderless Networks is instrumented to optimize the performance of the applications again regardless where the device is and if the application is local or hosted. And finally security. By implementing the hybrid hosted delivery model, borderless networks can spans network and cloud-based services to move security enforcement closer to the end user and thus enabling anytime, anywhere security and protection. Now let’s move to the Network Services which define the set of capabilities essential for the IT organizations to build and manage Borderless Networks. First, Network Resiliency and Control – which enables intelligent diagnostics, automation, and call home mechanisms through Cisco’s highly scalable routing protocols, robust redundancy schemes and network virtualization capabilities. Second, EnergyWise. It is an open system focused on optimizing energy usage of the network, devices and the buildings. It provides a set of platform capabilities that enable Borderless Networks to measure, manage, and reduce the energy consumption of not only the network elements but also the end-devices such as phones or PCs. By interfacing with the building control systems via the building mediator capability, EnergyWise will allows the IT organizations to set policies and manage all aspects of energy usage in the building. We also talked about the increased usage of business video and real-time collaboration applications. Medianet, the third element of the Borderless Network Services, provides not only the ability to deploy and manage multiple real-time collaboration applications, but will also to optimize video experience let’s say on hand-held devices by dynamically adjusting the video streams to match capabilities of these devices and the networks. And at the very top the policy and control layer which offers a flexible and dynamic framework for policy definition and enforcement that spans across mobility, performance, security, energywise, medianet and resiliency. It is focused on connecting the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications. In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments. Finally, if you look at the edges of this slide, it is also important to note, that Borderless Networks plays a key role in both Data Center and Collaboration strategies. Infrastructure
21
Borderless Network KTN is the Enabler
Business Transformation through Borderless Networks Business Transformation Borderless Network Scaling the Network Architecture Network Availability and Performance Network Asset and Lifecycle Management KTN is the first step and provides you the basis for you to transform your business. Using the business intelligence from KTN engagements, you are now positioned to realize a Borderless Network architecture for your organization. You now have: A detailed register of your network assets, and their lifecycle status, which is crucial to enable access for anytime/anywhere/anyone/anything. Understanding of risk, security or performance issues in your network Business-critical data needed to solidify your network architecture plans for business expansion Know the Network
22
Support Through the Lifecycle of Your Network Architecture
Borderless Networks Vision Solutions-Led Approach Architectural Assessment Architectural Blueprint Absorb, Manage, and Scale Technology You can use services from Cisco and its partners to accelerate your business transformation – such as A Solutions Led approach which utilizes discovery to identify business issues and a path for resolving them Architectural assessments – which help customers map capabilities, services, and solutions against your architectural blueprint to gauge readiness We can establish an architectural blueprint for migrating your networks based on proven, tested reference architectures, and show you what is needed to align to it And we can accelerate your ability to absorb, manage, and scale technology with leading practices and support at every step of the way. --- Accelerate business transformation with an architecture-led approach using intelligent, personalized services from Cisco and our partners to align IT solutions to business goals. Cisco and our partners can support you through the whole lifecycle of your network architecture. Solutions-led approach: Through discovery, we help you identify business issues and a path for resolving them. Architectural assessment: We help you map your capabilities, services, and solutions against the blueprint and gauge readiness Architectural blueprint: We can establish an architectural blueprint for migrating your networks that is based on a proven, tested reference architecture, and show you what is needed to align with it. Absorb, manage, and scale technology: We share knowledge and leading practices and support your success every step of the way as you deploy, absorb, manage, and scale new technology. Identify business issues and a path for resolving them through discovery Map your capabilities, services, and solutions against blueprint; gauge readiness Based on proven, tested reference architectures Improve performance, availability, security, operational excellence Services from Cisco and Our Partners
24
Backup Slides
25
Cisco Borderless Networks
Accelerated Business Growth Industry-Leading TCO Trusted Access Technology innovation Architectural leadership Borderless Professional Services End-to-end energy efficiency Proven investment protection Ease of operations Flexible pricing Seamless wired-wireless experience Trusted security and identity Extended security for the Borderless Enterprise
26
Borderless Experiences Media-rich Sessions Over Wireless Access Throughout the Day
Secure, Encrypted Business Communications 8:00 am Personalized Content, Smartphone and Digital Signage 11:00 am Based on Identity, Profile and Location 4:00 pm Think about a day in the life, if you will, with Borderless Networks You might get on the train in the morning… and during your commute, you can use technologies like Cisco AnyConnect to securely access your corporate network. Because you’re using a medianet enabled infrastructure – you can tune in to the corporate earning forecast and watch streaming video while in transit on the train – the network automatically adapts to the conditions of your wireless connection You get off the train and head in to the coffee shop where you’re going to meet with some co-workers to discuss your business plan. The coffee shop uses digital signage and the Barrista greets you by name and asks you if you’d like your usual order… even though you’ve never been in this particular shop before. In the background, the context-aware network picked up your smartphone ID, and used that information to relay customer loyalty information back to corporate – a text message pops on your phone thanking you for doing business and offering you a discount. Your co-worker shows up, and you sit down to discuss the business plan. You connect to the corporate network and access your collaboration portal to begin work. You go to access forecasting data for the next year, and the system displays a warning that you are accessing data in a potentially untrusted environment. You put on your privacy screen, and proceed to discuss your strategy.
27
A Lifecycle Approach to Service and Support
Coordinated Planning and Strategy Make Sound Financial Decisions Assess Readiness Can the Network Support the Proposed System? Design the Solution Products, Service, Support Aligned to Requirements Prepare Plan Design Cisco Partner Customer Optimize Operate Implement Prepare—Make sound financial decisions Establish financial justification through a business case Reduce later rework by developing a high-level, conceptual architecture Plan—Set the stage for smooth, on-time deployment Assess your network and sites Develop a project management plan Design—Reduce risk and rework, speed successful implementation Develop a comprehensive detailed design that meets business and technical requirements Implement—Speed return on investment Integrate devices without disrupting the existing network or creating points of vulnerability Operate—Maintain high availability, reduce expenses Maintain network health through day-to-day operations Optimize—Improve performance, availability, capacity, and security Achieve operational excellence through ongoing improvement of system performance and functionality Operational Excellence Adapt to Changing Business Requirements Maintain Network Health Manage, Resolve, Repair, Replace Implement the Solution Integrate Without Disruption or Causing Vulnerability
28
Prepare 1 2 3 Discover Current Network State
Network discovery Network assessment Upgrade design Process Helping to Identify What Is Required Proven design guides Customer examples Product benefits Procurement Offers + Options Financial case creation Leasing options Relevant promotions There are key next steps that we’ll walk through. First we’ll assess the current state of your network, what components exist, what software is running on them, and what the capabilities are. Then we’ll help you identify what’s required to meet your IT and business objectives, and finally we’ll help you with the financial aspects and provide you with access to any relevant Cisco promotional offerings. Overview: Network audits, audit tools (such as Cisco Discovery), network assessment activities (meaning what are the admin policies, architecture, readiness for ATs, etc...) are great ways to help the customer understand where they are, how prepared they are to meet their business needs, and how vulnerable they are today. Once this analysis is complete, as a value added partner, recommendations/plans can be made together. The purchasing decision can be eased through discounts (Cisco programs) and leasing options.
29
Plan Review your IT infrastructure and determine if it truly enables your business goals Fully understand your current network capabilities and perform a gap analysis Jointly develop an action plan We started by first recognizing that your network today was likely originally designed and implemented with a far different (and simpler) set of requirements 7+ years ago than what your company and IT department face today. We’ve also identified how modernizing your network with the latest Cisco solutions will address key issues and services requirements that you face today. We recognize that while the benefits of completing your network upgrade are clear, projects like this can at first appear to be complex or challenging. As an experienced Cisco partner, we are well prepared to provide you with the design, integration, and Day 2 support you need to make this a successful migration. Let’s start by first assessing your current network structure, understanding your business requirements and policies, and then we’ll jointly develop an action plan.
30
Engage the right Business Partner to build the right lifecycle implementation
Results of a Non-Integrated Network Assuring a Successful Network Lifecycle through Partner Expertise and Industry Best Practices Greater Management Overhead Slower Service Roll Out Selecting the right integration partner will help the network upgrade process move smoothly. As a valued Cisco partner, we can drive a zero-downtime network upgrade process – and overcome the typical concerns that IT mgmt faces with changes. There are many challenges to integrating services into a non-integrated network that go beyond financial. It can take longer to deploy new applications and services, The lack of integration leads to higher management overhead, Securing the entire enterprise can be much more complex, as is the support of any bolted-on technologies. Challenging Support Model Less Secure and Less Reliable
31
Architecture Planning for Business Growth Business Risk Management
KTN Graphic Architecture Planning for Business Growth Business Risk Management Network KTN Business Performance Financial Management
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.