You are on page 1of 11

Unified Networks

The Key to Business Agility

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Access: THEN

Limited. Siloed.
Purpose-built
Yet Simple. Limited Application Portability
Loss of Flexibility

DATA VOICE FACILITY

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Network Access: NOW
Applications Seamless
Anywhere Connectivity

More
Complex.

Growth in Network
Connected Devices

Network Complexity Can Disrupt the User Experience and Increase TCO
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Given Access Network Complexity…
Consider the Right Approach to Network Design

It’s NOT Point Network Access Technologies
About

Understanding the Application and User
It’s About Requirements of the Business

It’s About Allowing These to Determine the Right Network Topology

The Right Approach to Network Access Enables Your Users to Cross Network
Borders with a Secure, Consistent Experience
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Access Networks Comprise Wired,
Wireless and Remote Access Technologies
Deploy the Right Mix of
Technologies That Support
Your Varied Business
Requirements
Application
Directives
Evolution
Contact
Email Compliance Green
Center

Device Diverse
Proliferation Users
Smart- Smart
Engineer Sales Exec
phones Meters

An Architectural Approach Provides a Holistic View Of the Three Access
Technologies to Drive A Borderless Experience
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
What Is Network Unification?

Network Applications

Facilities Client

Unification Services
Staffing

Indoor and
Management
Outdoor

Security

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Define a Strategy with a Unification Checklist

Access Policies for Users and Devices

End-to-end Security

Simple, Single View of Network Operations

IT Support Coverage

Compliant

Green Considerations

Plan for Future Growth

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Define a Strategy with a Unification Checklist

Access Policies for Users and Devices

End-to-end Security

Simple, Single View of Network Operations

IT Support Coverage

Compliant

Green Considerations

Plan for Future Growth

Select a Vendor Who can Address Your End-to-End Access Needs
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Impact of Avoiding Unification

Network Simplifying User Managing Building a “Future
Interoperability Management Multi-vendor Proof” Network
Relationships

Increases Total Cost
of Operations

To Lower TCO, Define an Access Strategy That Aligns with Your Business
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Unification Summary
 Unification is a process – not a
technology
 Understand your application and Network Applications

user requirements
Facilities Client

 Plan your unification in steps
Unification
Network access Staffing Services

Network services
Indoor and
Outdoor Management
Management and policy
Security
 Wireless and wired networks are
cooperative and interdependent

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11