+ All Categories
Home > Documents > Cisco Customer Education - Cisco Files Customer Education. ... Cisco. 8x8. Avaya. Mitel. Siemens....

Cisco Customer Education - Cisco Files Customer Education. ... Cisco. 8x8. Avaya. Mitel. Siemens....

Date post: 22-May-2018
Category:
Upload: vothuan
View: 226 times
Download: 0 times
Share this document with a friend
76
Cisco Customer Education Is Your Technology Weighing You Down? You Need Simple IT from Cisco This session was recorded via Cisco WebEx! You can watch the live session recording HERE.
Transcript
  • Cisco Customer EducationIs Your Technology Weighing You Down? You Need Simple IT from Cisco

    This session was recorded via Cisco WebEx! You can watch the live session recording HERE.

    https://acecloud.webex.com/acecloud/lsr.php?RCID=78c8fa1d189842c49b736f1f4ea5fa67

  • Presentation Agenda Welcome from Cisco

    Welcome to the 21st Century

    Next Steps, Conclusion

    Technology Should be Easier

    Introducing Simple IT from Cisco

    Priors:Cisco Sales and Channels (11.5 yrs)President and CEO (6 yrs) - Cisco Premier Partner Director of Sales (2 yrs) - Cisco Silver PartnerFinancial Analyst (7 yrs) - Sprint Corporation

    About Your HostBrian AveryTerritory Business [email protected]

    @ciscobravery

  • CCE is an educational session for current and prospective Cisco customers

    Designed to help you understand the capabilities and business benefits of Cisco technologies

    Allow you to interact directly with Cisco subject matter experts and ask questions

    Offer assistance if you need/want more information, demonstrations, etc.

    What Is the Cisco Customer Education Series?

  • Welcome from Sysco!Oops! I mean Cisco!

  • Cisco Confidential 5 2013-2014 Cisco and/or its affiliates. All rights reserved.

    Computer scientists, Len Bosack and Sandy Lerner found Cisco Systems

    Bosack and Lerner run network cables between two different buildings on the Stanford University campus

    A technology has to be invented to deal with disparate local area protocols; the multi-protocol router is born

    1984

  • WellFleet

    SynOptics

    3Com

    ACC

    DEC

    Proteon

    IBM

    Bay Networks

    Newbridge

    Cabletron

    Ascend

    Fore

    Xylan

    3ComNortel

    Ericsson

    Alcatel

    JuniperLucent

    Siemens

    NECFoundry

    Redback

    Riverstone

    Extreme AristaHP

    Avaya

    Juniper

    Huawei

    Aruba

    Brocade

    Checkpoint

    Fortinet

    ShoreTel

    Polycom

    Microsoft

    F5

    Riverbed

    Dell

    Internet of Everything

    1990 1995 1996 2000 2001 2007 2008 Today

    The Landscape is Constantly

    Changing

    Leading for Over 30 Years

    2016

  • Cisco Confidential 7 2013-2014 Cisco and/or its affiliates. All rights reserved.

    Who Is Cisco?

    Chuck Robbins,CEO, Cisco

    Dow Jones Industrial AverageFortune 100 Company (AAPL, CSCO, INTC, MSFT)

    $158B Market Capitalization

    $48.5B in Revenue

    $10B in Annual Net Profits

    $36B More Cash than Debt

    $6.3B in Research and Development

    http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics

    http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics

  • Welcome to the 21st Century!

    What ever happened to our flying cars, robot servants and all that cool stuff?

  • Cisco Confidential 12 2013-2014 Cisco and/or its affiliates. All rights reserved.

  • Simple IT from Cisco

  • Cisco Confidential 19 2013-2014 Cisco and/or its affiliates. All rights reserved.

    Too much complexity.Too hard to change.

    The business is frustrated.

    IT is frustrated.

    New approaches are required.

    Todays IT Reality: Too. Much. Complexity.

  • Typical Multi-Vendor NetworkSwitching Routing Security Wireless Voice

    Cisco

    HPDellUbiquitiDlinkNetGearLinksys

    Cisco

    JuniperHuwaiAdtran

    Cisco

    WatchguardSonicwallFortinetCheckpointNetGearDlinkPalo Alto

    Cisco

    RuckusHPAerohiveAruba

    Cisco

    8x8AvayaMitelSiemensShoretelSamsungPanasonicToshibaIntertelComdialNECAlcatel

    Results in The Frankenstein Effect!Only Cisco Can Offer a Complete Solution

    Reliability challenges

    Inconsistent warranties

    Higher maintenance costs

    No single point of support

    Basic levels of integration

  • Cisco Confidential 21C97-731719-02 2014 Cisco and/or its affiliates. All rights reserved.

    IT should be simpler to monitor and manage

  • Simplifying IT with Cloud Management

    A complete cloud managed IT solutionWireless, switching, security, communications, EMM, and security camerasIntegrated hardware, software, and cloud services

    Leader in cloud-managed networkingAmong Ciscos fastest growing portfoliosOver 140,000 unique customersOver 2 million Meraki network devices online

    Cisco Meraki Overview

  • Meraki Full Stack of Cloud Networking Products

    Cisco Meraki Overview

    Indoor / Outdoor WirelessApplication traffic shapingGuest accessEnterprise security WIDS / WIPSEmbedded location analytics

    Unified Threat Management and WAN OptimizationZero-touch site-to-site VPNIntrusion detection/preventionContent filteringBuilt-in SD-WAN functionalityAdvanced Malware ProtectionApplication firewall

    Network SwitchingGigabit Access and Fiber aggregation switches Voice and video QoSLayer 7 app visibilityVirtual stackingMultigigabit support

    MDM / EMMRapid provisioningDevice posture reportingRemote wipeIntegration with AppleSimple network integrationBYOD made easy

  • MC communications

    Cisco Meraki Overview

    MV Security Cameras

  • Intuitive web-based dashboard

    Cisco Meraki Overview

    Site wide search

    Client location

    Traffic analytics

    Real-time control

    Client fingerprints

    Single pane of glassmanagement

    Phone

  • Secure, scalable architectureSecure out-of-band managementNo user traffic flows through the cloud

    ReliableNetwork stays up if connection to the cloud is lost

    ScalableSupporting customers with thousands of sites, millions of clients

    Future-proofNew features delivered seamlessly from the cloud

    Cisco Meraki Overview

  • Meraki Differentiators

    Cisco Meraki Overview

    Multi-site visibility and control

    Zero-touch provisioning

    Traffic acceleration

    Distributed Networks

    Layer 7 application and traffic shaping

    Cloud-based RF optimization

    Density-optimized WLAN

    High capacity edge networks

  • Meraki Differentiators

    Cisco Meraki Overview

    Air Marshal WIDS/WIPS

    User and device aware security

    UTM and content security

    Simplified enterprise security

    Optimize marketing and business operations

    Built-in location analytics

    Extensible API

    User analytics and engagement

  • Make Collaboration Simple with Cisco

    Brian Avery

    @ciscobraveryTerritory Business Manager

  • Cisco Confidential 30 2013-2014 Cisco and/or its affiliates. All rights reserved.

    Communication tools and have evolved buttheyre increasingly complicated and fragmented

    telephone

    meetings /calendar

    mobile / BYOD

    video / web conferencing

    documentsharing / editing

    smartphones

    audio conferencing

    instant messaging

    / chat

    content storage

    video streaming

    content sharing

    tablets

  • Cisco Confidential 31 2013-2014 Cisco and/or its affiliates. All rights reserved.

    TodayInterdependent workFlexible, self-regulated agile teamsTeam from anywhereWork with employees, partners, and customers

    PastIndividual work

    Fixed, long-term teamsTeams in the office

    Work mostly with employees

    The Way We Work Has Changed

  • Introducing Cisco Spark

  • True Unified Communications

    Message Meeting Call

  • One Simple App

  • On Any Device

  • Home OfficeMeetingRoom

  • Business Messaging

    One-to-one & team persistent messaging

    Easy to find content, everything in context

    Secure - always on encryption in transit, at rest

    Mobile, desktop, web app

    Easy to schedule/join meetings or make calls

    Integrate with existing business processes

    MESSAGING

    Cisco Spark

  • Cisco Spark

  • Cisco Spark

    Audio, Video and Web Conferencing

    Bring people together with continuous communication before,

    during & after the meeting on any mobile or video device for truly

    effective meetings

    Advanced meetings powered by WebEx

    Anyone can join incl. 3rd party standards-based

    Instant and scheduled meetings

    Voice, video, whiteboard, & content sharing

    Control your meeting experience from the app

    Ability to deploy Cisco Spark meetings on-premises

    MEETINGS

  • Brandon

    Fully integrating WebEx

    Cisco SparkMeetings

  • CALLING

    * Currently only supports US dial plan

    Cisco Spark App (Mobile)

    Cisco Endpoints (Desk)

    Cisco Spark

    Cloud-based phone systemHD voice & video callsOptimized PBX feature set (incl. E911)Cisco Spark app as softphone + choice of Cisco desk and room endpointsMake/receive calls across entire Cisco Spark serviceSimple provisioningPSTN connectivity provided (per user charge)PSTN services provided by Cisco Media Partners

  • Cisco Spark CallApp-Centric cloud-based collaboration for teams

    Complete business collaboration service from the Cisco Cloud

    Cisco Spark ServiceMeetings | Messaging | Calling

    Cisco Spark for DevelopersCisco Spark Hybrid Services

    Call Services Calendar &Directory ServicesHybrid Media

    Services

    Spark App Spark Phone Spark Rooms Spark Board

  • Cisco HyperFlex Systems

  • Cisco Unified Computing SystemA differentiated/revolutionary approach

    Unified Management

    Faster deploy/ provision

    Unification leads to reduced complexity

    Management via a single interface

    Simplified Architecture

    Networking with fewer components

    Lower cost and easier scaling

    Fewer management touch points

    Stateless: any resource, any time

    Better TCO/ROI

    Scale

    Ultimate Scalability

    Enhanced design capability

    Designed for the future, today

    Higher Performance

    Brings out the best of x86 architecture

    Optimized resource utilization for compute, networking, and management

  • ONE SYSTEM, ONE OPERATING MODEL

    FREESTANDINGINFRASTRUCTURE

    INTEGRATED INFRASTRUCTURE SCALE OUT HYPERCONVERGED

    Fog-Edge Cloud

    Cisco UCS: One System for All Workloads

    Core Data Center

    UCS S-Series Modular Servers

    Cisco UCS Blade and Rack Cisco

    HyperFlex

  • Hyperconvergence Meets Unified ComputingHyperFlex HX-Series

    HCI Built on Cisco UCS

    UnifiedFabric

    Integrated Compute

    Centralized Management

    Optimized for Virtualization

    Scale Without Complexity

    Low LatencyPhysical & Virtual

    Data & Management

    Proven PerformanceEnterprise ReliabilityBlades & Rack Mount

    Complete HW AbstractionPolicy & Profile Driven

    Optimized for Scale

    Comprehensive Hypervisor Integration

    Native I/O VirtualizationHypervisor Switching in HW

    Maintains Single Point of Management

    Self-IntegratingFewer Components

  • HyperFlex System Whats the appliance?

    Fabric Interconnects

    HX-240 or 220 Nodes

    UCS B-Series Blades

  • Hyperflex The Next Generation Data Platform

    Independent Scaling andScale Out Architecture Predictable, Pay-as-You-Grow Efficiency

    Enterprise Storage FeaturesCustom Built, Log Structured File System

    with Flash, Dedup and Compression Pointer-Based Snapshot

    Near Instant Clones

    Enterprise Data Protection

    Highly Available/Self-Healing Single Button Non-Disruptive Rolling UpgradesCall Home and Onsite 24x7 Support Available

    Single Point of Management

    Integrated into vCenterRobust Reporting and Analytics

  • Security in the 21st Century

  • Dangerous Times: Worlds biggest data breaches

    Identity Theft Resource Center 2016 Data Breach Report | Click Here

    Worlds Largest Data Breaches Visualization

    http://www.idtheftcenter.org/images/breach/DataBreachReport_2016.pdfhttp://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

  • Last 20 years of security:

    Got a problem? Buy a Box

  • Todays cyber-threat reality

    If you know you are going to be compromised, how

    should you do security differently?

    Why? Because youll never be able to prevent 100% of

    attacks.

    Your environmentwill get breached its not an IF its a

    WHEN

  • Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum

    BeforeDiscover EnforceHarden

    DuringDetect Block

    Defend

    AfterScope

    ContainRemediate

    Attack Continuum

    Data Center/Servers EndpointsEmail and Web Network Mobile

    Threat intelligence and analytics

    Point-in-Time detection

    Retrospective security and continuous analysis

  • Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum

    FireSIGHT and pxGrid

    ASA VPN

    Umbrella Meraki

    Advanced Malware Protection

    Network as Enforcer

    Intrusion Prevention

    Email Security

    Cloud Web SecuritySecure Access + Identity Services ThreatGRID

    BeforeDiscover EnforceHarden

    DuringDetect Block

    Defend

    AfterScope

    ContainRemediate

    Attack Continuum

  • Defending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack Continuum

    FireSIGHT and pxGrid

    ASA VPN

    Umbrella Meraki

    Advanced Malware Protection

    Network as Enforcer

    Intrusion Prevention

    Email Security

    Cloud Web SecuritySecure Access + Identity Services ThreatGRID

    BeforeDiscover EnforceHarden

    DuringDetect Block

    Defend

    AfterScope

    ContainRemediate

    Attack Continuum

  • Defending Against These Advanced Threats Requires Greater Visibility of New and Emerging Threats

    00I00 I00I0I II0I0I 0II0I I0I00I0I0 0II0I0II 0I00I0I I0 00 II0III0I 0II0II0I II00I0I0 0I00I0I00 I0I0 I0I0 I00I0I00

    III00II 0II00II I0I0II0II0 I0 I0 I00 00I0 I000 0II0 00

    III00II I000I0I I000I0I I000I0I II 0I00 I0I000 0II0 00 00I I0I0I0 I0I0III000 I0I00I0I 0II0I0 I00I0I0I0I 000

    II0II0I0I0I I0I0I0I 0I0I0I0I 0I0I00I0 I0I0I0I 0II0I0I0I

    0II00 I00I0I0 0I00I0I I00I0I0 I0I0I0I 0I0I0I 0I0I0I000I0I0 0I0I0I0 I0I0I00I 0I0I 0I0I 0I0I I0I0I 0I00I0I

    III00II 0II00II I0I000 0II0 00I0I00 I0 I000I0I 0II 0I0I0I

    III00II 0II00II 0I0I0I0I 0I I0 I00 000II0 I0I0 0II0 00

    24 7 365 Operations

    100 TBOf Data Received Daily

    1.5 MILLIONDaily Malware Samples

    600 BILLIONDaily Email Messages

    16 BILLIONDaily Web Requests

    MILLIONSOf Telemetry Agents

    4Global Data Centers

    19.7 BillionThreats Blocked Daily

    250+Full Time Threat Intel Researchers

    Globalscanning

    30 years building the worlds networks

  • Cisco Account Team: Josh King and Dan Brown

    Security, Networking, Datacenter, and Collaboration Made Easy with CiscoCisco Simple IT Architecture

  • IT Today IT Simplified

    Network

    Security

    Collaboration

    Datacenter

    Network

    Security

    Collaboration

    Datacenter

  • Network $30 - $40k annual consulting fees

    Security Meraki SD-WAN documented savings of $250k

    Collaboration $30k in annual upgrades

    Datacenter Support cost reductions

    Estimated Savings Opportunities Soft Savings Opportunities

    Network 50% reduction in networkoperational problems

    Security 10 minute roll-out

    Collaboration Approval times cut in half

    Datacenter 80% reduction in deployment times

    https://meraki.cisco.com/customers/event-venues/zero-latencyhttps://learn-umbrella.cisco.com/customer-videos/ptchttp://www.cisco.com/c/dam/en/us/products/collateral/conferencing/webex-meetings/case-study-c36-735832.pdfhttp://www.cisco.com/c/dam/en/us/products/collateral/hyperconverged-infrastructure/hyperflex-hx-series/cisco-bluepearl-case-study.pdf

  • What if we brought the simplicity of cloud to the datacenter?

  • Single Management Console

    Less than 60 minutes to deploy

    Scale like Cloud

  • 60 Billion number of messages sent through Whats App and Facebook Messenger daily

  • Messaging

    Meeting

    Call

  • Focus on whats important. Focus on the business, focus on the customer.

  • Simple

    Powerful

    Effortless

  • 54% of data breaches go undetected for months.

  • Visibility

    Invisible Protection

    Secure Traffic Off the Network

  • Backup, Recovery, Replication

    Security, Collaboration

    Hypervisor

    Mobile Device Management

    Endpoint Security

    Ecosystem Integrations

    ISEContact Centerand many others

  • Cisco Confidential 71 2013-2014 Cisco and/or its affiliates. All rights reserved.

    Questions?

  • Conclusion

  • Thank You and Next Steps

    Brian [email protected]

    Contact Your Cisco Partnerhttps://tools.cisco.com/WWChannels/LOCATR/performBasicSearch.do

    www.

    Learn more about Ciscohttp://www.cisco.com/

  • 0% Financing with Easy Pay

    Accelerate Your Technology Transformation

    Its easy Divide 90% of total product cost

    by 36 months Make 36 monthly payments at 0%

    interest Finance Cisco Services at 0%

    Flexible end-of-term options Return and refresh your

    technology Extend the lease Purchase the product solution at

    10% of the original cost

    Use our funds for FREE and stay ahead of the curve.

  • CCE sessions are held weekly on a variety of topics CCE sessions can help you understand the

    capabilities and business benefits of Cisco technologies

    Watch replays of past events and register for upcoming events!

    Visit http://cs.co/cisco101 for details

    Join us again for a future Cisco Customer Education Event

    http://cs.co/cisco101

  • Cisco Customer EducationPresentation AgendaWhat Is the Cisco Customer Education Series?Welcome from Sysco!Slide Number 5Leading for Over 30 YearsWho Is Cisco?Welcome to the 21st Century!Slide Number 9Slide Number 10Slide Number 11Slide Number 12Slide Number 13Slide Number 14Slide Number 15Slide Number 16Slide Number 17Simple IT from CiscoTodays IT Reality: Too. Much. Complexity.Typical Multi-Vendor NetworkSlide Number 21Simplifying IT with Cloud ManagementMeraki Full Stack of Cloud Networking ProductsMC communicationsIntuitive web-based dashboardSecure, scalable architectureMeraki DifferentiatorsMeraki DifferentiatorsMake Collaboration Simple with CiscoSlide Number 30The Way We Work Has ChangedIntroducing Cisco SparkSlide Number 33Slide Number 34Slide Number 35Slide Number 36Slide Number 37Slide Number 38Slide Number 39Slide Number 40Cisco Spark App (Mobile)Cisco Spark CallApp-Centric cloud-based collaboration for teamsCisco HyperFlex SystemsCisco Unified Computing SystemA differentiated/revolutionary approachCisco UCS: One System for All WorkloadsHyperconvergence Meets Unified ComputingHyperFlex HX-SeriesHyperFlex System Whats the appliance?Hyperflex The Next Generation Data Platform Security in the 21st CenturyDangerous Times: Worlds biggest data breachesSlide Number 51Todays cyber-threat realityDefending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack ContinuumDefending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack ContinuumDefending Against These Advanced Threats Requires Greater Visibility and Control Across the Full Attack ContinuumDefending Against These Advanced Threats Requires Greater Visibility of New and Emerging ThreatsCisco Simple IT ArchitectureIT TodaySlide Number 59Slide Number 60Estimated Savings OpportunitiesSlide Number 62Slide Number 63Slide Number 64Slide Number 65Slide Number 66Slide Number 67Slide Number 68Slide Number 69Ecosystem IntegrationsSlide Number 71ConclusionThank You and Next Steps0% Financing with Easy Pay Join us again for a future Cisco Customer Education EventSlide Number 76


Recommended