Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa
|
|
- Phoebe Shaw
- 8 years ago
- Views:
Transcription
1 Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa
2 Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3 Mobility Workplace Experience Video 7 Billion New Wireless Devices by 2015 Mobile Devices IT Resources Blurring the Borders Consumer Workforce Employee Partner Physical Virtual Anyone, Anywhere, Anytime Changing the Way We Work Video projected to quadruple IP traffic by 2014 to 767 exabytes Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4 Automatization Back End Personalization Network of Sensors *The computers generate more info than humans *Transparency *The content Delivery *New Standards M2M, connected cars, etc. Source: Markus Angermeier 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
5 2011: Networked devices = world population (>6B) 2015: Networked devices = double world population (15B) Source: Cisco IBSG, Cisco VNI 2011, Morgan Stanley Research, IMS Research 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
7 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
8 Use of Unsupported Network Devices (Total, n=511) Breach or Loss of Information Due to Unsupported Devices (Total, n=511) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10 Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
11 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
12 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
13 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
14 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
15 Trusted W i F i Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
16 Trusted W i F i n Wi- Fi Identity Based Access Control Apply defined policy profiles based on: Device Type User Location Application Mobile Device Managem ent WAN Optimization Service Assurance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
17 Trusted W i F i Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
18 Trusted W i F i n Wi-Fi Location Video Optimization Spectrum Intelligence Client Acceleration Is Mr. Allen s lab work ready yet? Identity Based Access Control Not yet but i will let you know the moment it arrives Mobile Device Managemen t 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
19 Untrusted W i F i Access: Limited 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
20 Hotspot n Wi-Fi Web/ Security Identity Based Access Control VPN Collaboratio n/ UC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
21 3G/4G Access: Limited No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
22 3G/4G Identity Based Access Control VPN Intelligent Packet Core 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
23 Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
24 Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook? Lunch Hour Location Streaming Media Business-related Content P2P All Object Compliance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
25 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
26 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
27 Desktop NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
28 Mobility Bring Your Own Desktop Devices NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
29 Mobility Bring Your Own Devices NETWORK Cloud/ Virtualization Data SaaS DC / V Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
30 Immersive Collaboration Pervasive Video Mobility Bring Your Own Devices NETWORK SECURITY Cloud/ Virtualization SaaS DC / V IT PRODUCTIVITY ENERGY EFFICIENCY 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
31 AnyConnect Virtual and Cloud Cisco SecureX Architecture Cisco SIO Context Aware Policy The Network Context Aware Enforcement Appliance Module Cloud The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
32 Importancia del soporte de IPV6 en el punto terminal Amenazas: Cabeceras, Private extensions, IPV4 Tunnels, etc Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
33 Embedded in Device Tethered External Connectivity Services Cloud Domain Gateway to multiple sensors M2M Device Domain Low power device networks such as Zigbee, RFID etc May contain M2M Gateway M2M Cloud Domain Allows high-level application providers to use SP infrastructure This may be hosted by the Wireless network operator Mobile SP Vs M2M SP Connectivity Services Provides the IP transport infrastructure for M2M communication 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
34 Data Center Core Multi-Svc Energy Smart Cities Network Management FOG Connected Vehicles E-Health ONE architecture/platform for multiple services/verticals An architecture/platform Not just a set of disparate products Leading innovation 130+ IoT patents An End-to-End approach (fundamental for the IoT) with Distributed Data Processing Embedded Cisco Stack Support of legacy protocols => migration path to IP (IOS) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
35 Architecture for Agile Delivery of the Borderless Experience POLICY BORDERLESS END-POINT/ USER SERVICES Securely, Reliably, Seamlessly: AnyConnect MANAGEMENT CISCO SMART SERVICES BORDERLESS NETWORK SERVICES Mobility: Motion Energy Management: EnergyWise Security: TrustSec App Performance: App Velocity Multimedia Optimization: Medianet CISCO LIFECYCLE SERVICES BORDERLESS NETWORK SYSTEMS Unified Access Campus Core Unified Fabric Extended Edge Extended Cloud BORDERLESS INFRASTRUCTURE Wireless Routing Switching Application Networking/ Optimization Security PROFESSIONAL SERVICES: Realize the Value of Borderless Networks Faster 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
36 Borderless Experience ANYONE ANYTHING ANYWHERE ANYTIME Securely, Reliably, Seamlessly 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
37
38
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
More informationUn mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa
Un mundo de Clouds: Seguridad y Adopción Cisco + Intel Pilar Santamaria Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad
More informationBYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationhttp://www.velocis.in Extending Collaboration to BYOD Devices
Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationThe Top Ten Advantages of Using Cisco Enterprise Networking in 2014
Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010
More informationCONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS
CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationCisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
More informationThe Internet of Things... Hype or not?
The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune
More informationCisco Passguide 648-385 Exam Questions & Answers
Cisco Passguide 648-385 Exam Questions & Answers Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 34.1 http://www.gratisexam.com/ Cisco 648-385 Exam Questions & Answers Exam Name: CXFF
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationAdvanced Security for Account Managers-ASAM
Advanced Security for Account Managers-ASAM Number: 646-580 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 What are three major trends that fuel the
More informationCisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationCisco Network Optimization Service
Service Data Sheet Cisco Network Optimization Service Optimize your network for borderless business evolution and innovation using Cisco expertise and leading practices. New Expanded Smart Analytics Offerings
More informationRemote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
More informationThe Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015
The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects
More informationCisco Collaboration Architecture: Enhance Employee Effectiveness for Greater Business Impact
White Paper Cisco Collaboration Architecture: Enhance Employee Effectiveness for Greater Business Impact What You Will Learn The power to bring people together at critical moments can significantly enhance
More informationHow the Internet of Things Will Transform the Manufacturing Industry
How the Internet of Things Will Transform the Manufacturing Industry Dinesh Malkani President, Cisco India & SAARC February 26, 2015 By 2018, Video will be 62% of India's mobile data traffic India Is Ready
More informationBYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
More informationTransforming Employee Engagement
Cisco IT Article March 2012 Transforming Employee Engagement Business Transformation Through Architectures Transforming Employee Engagement By Jawahar Sivasankaran, Distinguished IT Engineer IT Customer
More informationBring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG (bokng@cisco.com) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
More informationCisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with
More informationCisco dan. Beograd, Srbija 1.april.2015. TOMORROW starts here.
Cisco dan Beograd, Srbija 1.april.2015. TOMORROW starts here. 1 Innovations And Architectures in IoE Age Cisco Day, Belgrade, Serbia Petr Pavlu, ppavlu@cisco.com Director Systems Engineering, Cisco EMEAR
More informationFast Lane México presenta su calendario de cursos:
Communica ons & Services Certification & Recertification CI-CIERS1 Cisco Internetwork Expert Routing & Switching 1 14/05/2012 18/05/2012 CI-CIERS2 Cisco Internetwork Expert Routing & Switching 2 25/06/2012
More informationEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
More informationCisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats
More informationCollaborative Professional Services
April 2013 Collaborative Professional Collaboration Borderless Networks Data Center Americas Eligibility Requirements and List Pricing 1 Collaborative Professional 2 Cisco Collaborative Professional Cisco
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationStart New Conversations, Open New Doors
@ulander Start New Conversations, Open New Doors Grow Your Business with Cisco Peder Ulander Vice President, Cloud and Managed Services Partner Organization, Cisco August 9, 2015 The World Is Changing
More informationCisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
More informationBring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
More informationHierarchical Network Design
CHAPTER 1 Hierarchical Network Design Objectives Upon completion of this chapter What are the structured engineering principles of network design? How do you apply the three hierarchical network layers
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationThe Internet of Everything
The Internet of Everything The Next Evolution of the Internet is Changing Everything Todd Meister Vice President, Software and Solutions Innovation Americas Partner Organization, Cisco October 23, 2014
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationMobil data hetare än någonsin.
Mobil data hetare än någonsin. Peter Jerhamre, Systems Engineer 2010 Cisco and/or its affiliates. All rights reserved. 1 2010 Cisco and/or its affiliates. All rights reserved. 2 60% Ifrågasätter kontorets
More informationHuawei Agile WAN Solution
Huawei Agile WAN Solution WAN Development and Challenge As more Enterprise services are deployed on IT systems and transmitted over IP networks, Enterprise networks are expanding to support more service
More informationManaged 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service
Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationWelcome to the era of the anywhere worker
Welcome to the era of the anywhere worker Today s anywhere worker is more responsive, more productive and more mobile than ever before. Don t just add mobile. Be mobile. Real-time conversations are happening
More informationBYOD Security Challenges in Education: Protect the Network, Information, and Students
BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white
More informationAdvantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
More informationBuilding the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems
Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine
More informationCisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
More informationLogicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device
Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today
More information642-385 Exam Questions Demo http://www.certshared.com/exam/642-385/ Cisco. Exam Questions 642-385. Cisco Express Foundation for Field Engineers
Cisco Exam Questions 642-385 Cisco Express Foundation for Field Engineers Version:Demo 1. Which two questions should you ask when assessing an organization\'s security needs? (Choose two.) A. Are you exploring
More informationData Center Network Evolution: Increase the Value of IT in Your Organization
White Paper Data Center Network Evolution: Increase the Value of IT in Your Organization What You Will Learn New operating demands and technology trends are changing the role of IT and introducing new
More informationProductive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
More informationCollaborazione a misura d uomo
Collaborazione a misura d uomo Esigenze diverse, obiettivi comuni Gianluca Ferrè CTO Collaboration EMEAR South 28 Maggio 2013 Collaboration: The act of people working together to reach a common goal. We
More informationCisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
More informationCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
White Paper Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things Connect things. Analyze and act on the data they produce in milliseconds. Then send the right data to the cloud for
More informationHow To Make Your Phone A Mobile Device Safe And Secure
WHITE PAPER www.brocade.com ENTERPRISE NETWORKS and Aruba Deliver Optimized and Effortless Mobility Two companies combine two innovative architectures to deliver optimized, secure, and effortless mobility.
More informationRIOT CONTROL The Art of Managing Risk for Internet of Things
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
More informationBYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
More informationData Center Security That Accelerates Your Business
Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,
More informationEvolving the Data Center Critical Cloud Success. A Light Reading Webinar Sponsored by
Evolving the Data Center Critical Cloud Success A Light Reading Webinar Sponsored by Webinar Logistics Participate in the webinar: Ask questions, share feedback via the survey, and access the Information
More informationBrocade and Aruba Deliver Optimized and Effortless Mobility
WHITE PAPER www.brocade.com ENTERPRISE NETWORKS and Aruba Deliver Optimized and Effortless Mobility Two companies combine two innovative architectures to deliver optimized, secure, and effortless mobility.
More informationBT One. Analyst and consultant update, September 2012. BT One. Communications that unify 1
BT One Analyst and consultant update, September 2012 BT One. Communications that unify 1 BT One Agenda Introductions Neil Sutton Vice President Global Portfolio BT One Overview Andrew Small Vice President
More informationSikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
More informationA ZK Research Whitepaper. October 2014. Cisco s Branch Infrastructure Powers the HYBRID WAN
A ZK Research Whitepaper October 2014 Cisco s Branch Infrastructure Powers the HYBRID WAN ZK Research Cisco s Branch Zeus Infrastructure Kerravala BYOD Powers And the Collaboration Hybrid WAN ABOUT THE
More informationPreparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014
Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014 [Type text] As the limited number of remaining IPv4 addresses are allocated to ISPs, it is becoming increasingly
More informationBuilding the Next-Generation End-to-End IP Communications Architecture
Building the Next-Generation End-to-End IP Communications Architecture Produced by Sponsored by By Eric Krapf, Program Co-Chairman, Enterprise Connect; Editor, No Jitter A s communications networks migrate
More informationEnd-to-End M2M and IoT Services
End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who
More informationCisco Desktop Virtualization with UCS: A Blueprint for Success
Cisco Desktop Virtualization with UCS: A Blueprint for Success Eugenios Zervoudis Product Sales Specialist ezervoud@cisco.com Challenges with Desktop Virtualization today Challenges implementing Enterprise
More informationCisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
More informationCisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 7, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems Development
More informationCisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 20, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems
More informationWhy Cloud Computing Needs a Cloud-Intelligent Network
Why Cloud Computing Needs a Cloud-Intelligent Network April 2012 Prepared by: Zeus Kerravala Why Cloud Computing Needs a Cloud-Intelligent Network 2 Why Cloud Computing Needs a Cloud-Intelligent Network
More informationCisco / Microsoft Unified Communications Integration Overview. 2010 Cisco and/or its affiliates. All rights reserved.
Cisco / Microsoft Unified Communications Integration Overview 2010 Cisco and/or its affiliates. All rights reserved. 1 2010 Cisco and/or its affiliates. All rights reserved. 2 3.6 8 million 600k 300k Billion
More informationNetwork Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services
Network Evolution, Cloud & Future Services Opportunities & Challenges for Next-Decade Services Outline Trends: Data, Services & Networks Cloud What is Next? 2 Law of Telecom Complexity Telecom complexity,
More informationPRESIDIO MANAGED SERVICES OVERVIEW JULY 2013
OVERVIEW JULY 2013 AGENDA Overview Capabilities Commitment OVERVIEW Capabilities Addressing today s IT challenges Our Capabilities and Approach Network Data Center Collaboration Security Workplace Service
More informationCisco Collaboration: Improve Collaboration, Improve Business
Solution Overview Cisco Collaboration: Improve Collaboration, Improve Business Work is more interconnected than ever before. Employees are more empowered and want greater freedom in how and where they
More informationCloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete
More informationCisco Intercloud Fabric Security Features: Technical Overview
White Paper Cisco Intercloud Fabric Security Features: Technical Overview White Paper May 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of
More informationNetwork Virtualization
. White Paper Network Services Virtualization What Is Network Virtualization? Business and IT leaders require a more responsive IT infrastructure that can help accelerate business initiatives and remove
More informationMobile Collaboration in the Public Sector: Work Your Way, on Any Device
Mobile Collaboration in the Public Sector: Work Your Way, on Any Device What You Will Learn Two social trends are transforming work styles in the public sector. More employees work outside the office,
More informationM2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?
M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact? M2M + Industry Forum / 13 April 2013 Joachim Dressler Board Member - M2M Alliance e.v. VP EMEA Sales Sierra Wireless
More informationNetScaler Cloud Bridge
WHITE PAPER Citrix NetScaler NetScaler Cloud Bridge Any-to-Any Access Across Public and Private Clouds www.citrix.com Contents Executive Summary... 3 The challenges for hybrid clouds... 4 NetScaler Cloud
More informationHow will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
More information300-208 - Implementing Cisco Secure AccessSolutions Exam
Implementing Cisco Secure Access Solutions Duration: 5 Days Course Code: SISAS Overview: This course has been designed to provide engineers with the foundational knowledge and skills required to implement
More informationCisco Networking Capabilities for Medianet
Cisco Networking Capabilities for Medianet Product Overview A medianet is an end-to-end architecture for a network comprising advanced, intelligent technologies and devices in a platform optimized for
More informationThe Internet of Things. Giles Norman MobileFirst Consulting Manager, IBM. Daniel Dombach Director EMEA, Industry Solutions, Zebra Technologies
The Internet of Things Giles Norman MobileFirst Consulting Manager, IBM Daniel Dombach Director EMEA, Industry Solutions, Zebra Technologies Internet of Things Daniel Dombach Director EMEA Industry Solutions
More informationCisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems
Cisco Prime Network Services Controller Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems Agenda Cloud Networking Challenges Prime Network Services Controller L4-7 Services Solutions
More informationSolutions for admission control and data loss prevention in a modern corporate network
Solutions for admission control and data loss prevention in a modern corporate network 15 th Finance Tech Forum Yasen Spasov Sales & Pre-sales Manager Executive Summary Founded in 1995 Subsidiary of INTRACOM
More informationThe Next Generation of Collaboration Cisco Unified Communications Manager (CUCM) v10.6
The Next Generation of Collaboration Cisco Unified Communications Manager (CUCM) v10.6 Meet Your Presenters President/CEO: Greg Nordone Greyson Technologies, Inc. gnordone@greyson.com Sr. Network Engineer:
More informationEVOLVED DATA CENTER ARCHITECTURE
EVOLVED DATA CENTER ARCHITECTURE A SIMPLE, OPEN, AND SMART NETWORK FOR THE DATA CENTER DAVID NOGUER BAU HEAD OF SP SOLUTIONS MARKETING JUNIPER NETWORKS @dnoguer @JuniperNetworks 1 Copyright 2014 Juniper
More informationMAKING THE RIGHT CONNECTIONS
MAKING THE RIGHT CONNECTIONS The risks of using public Wi-Fi for business The Connected Workplace Series The Rise of Mobile Devices in the Workplace Laptop shipments have surpassed desktop shipments, smartphone
More informationCisco SecureX Product Brochure
Cisco SecureX Product Brochure Security Matters More Than Ever Traditional approaches to network security were designed for a single purpose: to protect resources inside the network from threats and malware
More informationIntroduction to Cloud Networking. Meraki Solution Overview
Introduction to Cloud Networking Meraki Solution Overview 1 About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed Initial technology developed at MIT - tradition of
More informationCLOUD ADOPTION AND IPV6 TRANSITION
CLOUD ADOPTION AND IPV6 TRANSITION Nephos6 Expertise and Experience Expertise Experience Co-Authored Books and Standards RFC 4779 RFC 5180 RFC 5375 RFC 5741 RFC 6105 Certifications CISSP CCSK CSCI VCP
More informationSecurity Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Fast Facts In 2012, 9 billion devices were connected to the Internet, and 50 billion are projected to be connected by 2020. Global data center traffic is expected to quadruple over the next five years,
More informationCisco Systems, Inc. 1 of 9 1/31/2013 1:22 PM
1 of 9 1/31/2013 1:22 PM This report lists the current Cisco Systems, Inc. exams being offered by VUE Testing Systems, sorted by the Exam Code. Cisco Systems, Inc. You can click on the Exam Code hyperlink
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More information644-068. Cisco - 644-068 Advanced Routing and Switching for Field Engineers - ARSFE
Cisco - 644-068 Advanced Routing and Switching for Field Engineers - ARSFE 1 QUESTION: 1 Which three of the following are major trends that fuel the demand for routing and switching? (Choose three.) A.
More information