Bridging the wired wireless
description
Transcript of Bridging the wired wireless
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID
Unified NetworksThe Key to Business Agility
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 2
Limited. Siloed.
Purpose-built
Limited Application Portability
Loss of Flexibility
DATA VOICE FACILITY
Yet Simple.
Network Access: THEN
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 3
Network Complexity Can Disrupt the User Experience and Increase TCO
Seamless
Connectivity
More Complex.
Growth in Network
Connected Devices
Applications
Anywhere
Network Access: NOW
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 4
It’s NOT About
It’s About
It’s About
Point Network Access Technologies
Allowing These to Determine the Right Network Topology
Understanding the Application and User Requirements of the Business
Given Access Network Complexity…Consider the Right Approach to Network Design
The Right Approach to Network Access Enables Your Users to Cross Network Borders with a Secure, Consistent Experience
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 5
DirectivesApplication Evolution
Device Proliferation
Diverse Users
Deploy the Right Mix of Technologies That Support
Your Varied Business Requirements
EmailContactCenter
Compliance Green
Smart-phones
SmartMeters
Engineer Sales Exec
Access Networks Comprise Wired, Wireless and Remote Access Technologies
An Architectural Approach Provides a Holistic View Of the Three Access Technologies to Drive A Borderless Experience
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 6
What Is Network Unification?
Management
Security
Indoor and Outdoor
Staffing
Facilities Client
Services
Network Applications
Unification
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 7
Access Policies for Users and Devices
End-to-end Security
Simple, Single View of Network Operations
IT Support Coverage
Compliant
Green Considerations
Plan for Future Growth
Define a Strategy with a Unification Checklist
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 8
Access Policies for Users and Devices
End-to-end Security
Simple, Single View of Network Operations
IT Support Coverage
Compliant
Green Considerations
Plan for Future Growth
Select a Vendor Who can Address Your End-to-End Access Needs
Define a Strategy with a Unification Checklist
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 9
Network Interoperability
Simplifying User Management
Managing Multi-vendor Relationships
Building a “Future Proof” Network
Impact of Avoiding Unification
Increases Total Costof Operations
To Lower TCO, Define an Access Strategy That Aligns with Your Business
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 10
Unification Summary
Unification is a process – not a technology
Understand your application and user requirements
Plan your unification in steps
Network access
Network services
Management and policy
Wireless and wired networks are cooperative and interdependent
Management
Security
Indoor and Outdoor
Staffing
Facilities Client
Services
Network Applications
Unification
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 11