powered by  · Days saved per year Traceroute Instantaneous 6 minutes 6 minutes 25 2.5 hours 15...

Preview:

Citation preview

powered by

www.clujconnectingday.ro

www.clujconnectingday.ro

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Today’s reality

Workers connecting everywhere

Loss of control

More interconnected than ever

Expanded attack surface Multi-cloud reality

A software-defined world

Automated and sophisticated threats

High likelihood of a breach

Continuous operations

Must keep business running

www.clujconnectingday.ro

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Phishing

DDoS

Advanced Persistent Threats

Ransomware

Botnets

Wiper Attacks

Data/IP Theft

Spyware/Malware

Man in the Middle

Drive by Downloads

Malvertising

Unpatched Software

Rogue Software

Credential compromiseCryptomining

Attack landscape constantly evolving Supply chain attacks

3200 security decision makers surveyed around the world

79% of respondents said it was somewhat or very challengingto orchestrate alerts from multiple vendor products, (increase from 74% in 2018.)

Vendor proliferation remains a problem

In 2018 there were 54% of respondents with 10 or fewer vendors in their environment; in 2019 this number has risen to 63%. More respondents have fewer vendors; vendor consolidation, for a variety of possible reasons, is real and measurable.

And so CISOs are trying to consolidate

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Impossibly complex

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

problem solution

SIMPLIFICATION

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Power aMulticloud World

Reinventthe Network

Unlock the Power of Data

Security is Foundational

Create Meaningful Experiences

Increased Pace of Innovation

Secure, Intelligent Platform for Digital Business

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

I N T E N T C O N T E X T

S E C U R I T Y

L E A R N I N G

WANOptimize and secure application performance over any connection

AccessSegment network; secure user access from edge to cloud

Data CenterRun traditional or cloud native applications across any environment

Cloud EdgeSecurely connect and protect cloud workloads

Reinvent Networking

Multicloud

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Reinvent the Network

Intent-Based Network for Agility and Assurance

C97-740844-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential

Cisco DNA CenterDelivering real outcomes today…

* Source: Internal TCO analysis with large enterprise customer (actual results may vary)

61%Lower operating

expense

48%Reduced impact

of security breaches

80%Improved issue

resolution

67%Network

provisioningtime savings

Cisco DNA AssuranceFrom network data to business insights

Metadata extraction

Complex correlation

Steam Processing

Clients Baseline

Application NetworkIPAM

CMXAppD

IPSLA

SNMP

OID

Telnet

DNS

MIB

Ping

CLI

DHCP

Wireless

AAA

Syslog

Router

NetFlow

Traceroute

Network telemetrycontextual data

Complex event processing

Correlated insights

Suggestedremediation

Over 150 actionable insightsClients | Applications | Wireless | Switching | Routing

Everything as a sensor

The cost of troubleshooting

Typical troubleshooting issues for an enterprise network with 800 users (wired and wireless)

Issue/task Cisco DNA Center Traditional CLI SavingsOccurrences

per weekHours saved

per weekDays saved

per year

Traceroute Instantaneous 6 minutes 6 minutes 25 2.5 hours 15

Slow onboarding 2 minutes 17 minutes 15 minutes 20 5 hours 30

Device RPA failure Instantaneous 20 minutes 20 minutes 6 2 hours 12

Radio channel analysis 5 minutes 25 minutes 20 minutes 6 2 hours 12

Issue replication 5 minutes 65 minutes 60 minutes 2 2 hours 12

Site visit Not required 180 minutes 180 minutes 0.5 1.5 hours 9

Total: 15 hours 90

What would you do with 90 extra productive days per year?90

© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

UTM

Network Analytics

Advanced Malware

Secure Internet Gateway

WebW W W

Policy and Access

Email

Cloud Access Security

Threat Protection Visibility Segmentation

Firewall

21

Security is Foundational

Security Across the Platform

C97-740844-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential

The Network. Intuitive.Powered by intent. Informed by context.

Journey to intent-based networking

We are here

Digital—ready infrastructure

Secure foundation

Programmability

Virtualization

Analytics and assurance

Everything as a sensor

Telemetry Historical and real time

Policy-based automation

Business policy

Translation Segmentation

Machine learning and AI

Policy validation

Predictive Self-healing

Intent-based networking

Constantly learning

Constantly adapting

Constantly protecting

Scaling (via cloud)

A way of life…Culture

www.clujconnectingday.ro

74,200 individual parts make the bridge to possible, possible.

2

5

Presentation ID

“The illiterate of the 21st century

— Alvin Toffler

Continuous Learning

www.clujconnectingday.ro

The bridge for the world

Recommended