cisco customer education customer education get your head in the cloud: cloud solutions from cisco...
TRANSCRIPT
Cisco Customer EducationGet Your Head in the Cloud: Cloud Solutions from Cisco
This session was recorded via Cisco WebEx! You can watch the live session recording via the following URL:
https://acecloud.webex.com/acecloud/lsr.php?RCID=a3821c447c0c4679ae6ba7cf56b7ced2
Cisco Customer EducationGet Your Head in the Cloud: Cloud Solutions from Cisco
Connect using the audio conference box or you can call into the meeting:1. Toll-Free: (866) 432-99032. Enter Meeting ID: 207 088 558 3. Press “1” to join the conference.
Presentation Agenda► Welcome from Cisco
► Why Cisco for Cloud?
► Conclusion
► Cisco XaaS Cloud Services The “easy” button
Priors:Cisco Sales and Channels (11 yrs)President and CEO (6 yrs) - Cisco Premier Partner Director of Sales (2 yrs) - Cisco Silver PartnerFinancial Analyst (7 yrs) - Sprint Corporation
About Your HostBrian AveryTerritory Business ManagerCisco Systems, [email protected]
CCE is an educational session for current and prospective Cisco customers
Designed to help you understand the capabilities and business benefits of Cisco technologies
Allow you to interact directly with Cisco subject matter experts and ask questions
Offer assistance if you need/want more information, demonstrations, etc.
What Is the Cisco Customer Education Series?
Welcome from Sysco!Oops! I mean Cisco!
Cisco Confidential 6
Computer scientists, Len Bosackand Sandy Lerner found Cisco Systems
Bosack and Lerner run network cables between two different buildings on the Stanford University campus
A technology has to be invented to deal with disparate local area protocols; the multi-protocol router is born
1984
WellFleet
SynOptics
3Com
ACC
DEC
Proteon
IBM
Bay Netw orks
Newbridge
Cabletron
Ascend
Fore
Xylan
3ComNortel
Ericsson
Alcatel
JuniperLucent
Siemens
NECFoundry
Redback
Riverstone
Extreme AristaHP
Avaya
Juniper
Huawei
Aruba
Brocade
Checkpoint
Fortinet
ShoreTel
Polycom
Microsoft
F5
Riverbed
Dell
Internet of Everything
1990 –1995 1996 – 2000 2001 – 2007 2008 – Today
The Landscape is Constantly
Changing
Leading for Over 30 Years
2016
Cisco Confidential 8
Who Is Cisco?
Chuck Robbins,CEO, Cisco
• Dow Jones Industrial AverageFortune 100 Company (AAPL, CSCO, INTC, MSFT)
• $117B Market Capitalization
• $49.6B in Revenue
• $10B in Annual Net Profits
• $34B More Cash than Debt
• $6.3B in Research and Development
http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics
No. 1
Voice
41%
No. 1
TelePresence
50%
No. 1
Web Conferencing
43%
No. 1
Wireless LAN
50%
No. 2
x86 Blade Servers
29%
No. 1
RoutingEdge/Core/
Access47%
No. 1
Security31%
No. 1
SwitchingModular/Fixed
65%
No. 1
Storage Area Networks
47%
Market Leadership Matters
Why Cisco For Cloud?
Cisco Confidential 11C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
The world’s largest taxi company owns
no vehicles.
Cisco Confidential
The world’s most popular media
company creates no content.
The world’s most valuable retailer has
no inventory.
The world’s largest accommodation provider owns no
real estate.
Explosion of Digital Businesses
Cisco Confidential 12C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
30MNew devices connected every week
78%Workloads processed
in Cloud DCsby 2018
180BMobile apps downloaded
in 2015
277XData created by IoE devices
v. end-user
Digital Disruption On a Massive ScaleCisco Confidential
5TB+of data per person
by 2020
Cisco Confidential 13C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Exponential Growth of Shadow Cloud
2H 2014 1H 2015
17% Growth
Based on Cisco Cloud Consumption Service engagements with large enterprise customers
Cloud Use In Enterprise Shadow Cloud Challenge
575
675
Customers use 675cloud services on average
15-22X more cloud services purchased
without IT involvement
Cisco Confidential
Cisco Confidential 14C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
SaaS
PaaS IaaS
A Broader Perspective Is Required…
Cisco Confidential
Data Center Cloud Edge / IoT
Cisco ConfidentialSecurity Everywhere
Cisco Confidential 15C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
TraditionalApplications
ERP, Financial, Client/Server, CRM, Email
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 16C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
TraditionalApplications
ERP, Financial, Client/Server, CRM, Email
Cloud NativeApplications
IoT, Big Data, Analytics, Gaming
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 17C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Choice, Compliance, Control
Leads to New Customer Business Problems
Global Presence
Data & Analytics
InfiniteScale
Backup and Availability
Development and Testing
Cisco Confidential
Cisco Confidential 18C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Intercloud Is Our Hybrid Cloud Strategy To Harness the World of Many Clouds and Digitization
Cisco Intercloud Marketplace
Intercloud
Alliance
Public Clouds
Intercloud Services
Intercloud Providers
Enterprise Private Cloud
Cisco Confidential
Public Cloud
Cisco ONEEnterprise Cloud Suite
Cisco UCSO®
Cisco Metapod™ Platform
Private Clouds
Same Code Base
Same Applications
Same Operational Model
Seamless Connectivity
Unified Experience
Intercloud
Cisco Confidential 19© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Infrastructure as a Service Solutions
Hosted Collaboration
Unified Communications
Customer Collaboration
TelePresence
DaaSSolutions
• Compute (IaaS)• Disaster Recovery
As A Service (DRaaS)• Hosted
Security (HSS)
• Desktop As A Service
• VXI As A Service
Cisco’s Solutions for Enabling the Cloud Pre-Integrated and Tested Solutions
Industry-Leading XaaS Solutions
Cloud NetworkingCloud Security
Cloud Collaboration
Cisco Spark
What IS Cisco Spark?
Cisco Spark
True Unified Communications
Message CallMeeting
Does This Look Familiar?
Spark is “Facebook for Business”
Meeting
Instant Meetings
Voice, Video, and Content
Sharing
Join from Any Endpoint –
even 3rd party
Always on Personal
Meeting RoomRecord
Meetings
Basic Meetings
Advanced Meetings
Basic Meetings from the Cisco Spark AppBasic Meetings - M2
• Instant Meetings (straight from a Spark room)• Start the ball rolling in a virtual room ahead
of any scheduled meeting • Up to 25 participants• Basic Voice, Video, and Content Sharing• Participants List with Names and Video Film
Strip• Easy to join from anywhere:
• Spark mobile or desktop app• Cisco IP phone registered to Spark• Spark Room System
Spark Meeting
Spark Room Systems
Spark Desk Phone
Spark App
Spark Desktop Client
• WebEx– up to 200 participants
• Meet anywhere – any phone or device
• 3rd party integration (Skype, SIP, H.323)
• Personal Meeting Room
Advanced Meetings: WebEx Powered Meetings
• In meeting markup tools, whiteboard, and chat
• Roster list, with active speaker notification
• Meeting moderation features
• Record meetings in full
Spark Advanced MeetingsAnywhere, Any Device, Any Time
Cisco Collaboration Cloud
Spark Room System
Cisco Spark
Spark Desk Phone
Cisco TelePresenceEndpoints
3rd Party endpoints & service
integrationsSpark App
Spark Desktop Client
WebEx Client
Call
Cloud-based Phone
System1
Mobile First / Spark App
Desktop Phones
Cisco 7800 + 8800 series
OTT Access Connect Phones
Anywhere
Dial by Directory, Number, Extension
1 The Cisco Spark service doesn’t include PSTN services. Customers need to purchase PSTN services from a 3rd party provider. For the complete Spark service, Cisco preferred media provider ecosystem partners can provide PSTN local, long-distance, and direct-inward-dial
services. Existing Cisco UC customers will use Spark Hybrid Services to connect on-premises call capabilities to Cisco Spark capabilities in the cloud.
Spark Call Features
• Audio, Video, PSTN calling
• Call Forward and Transfer
• Hold/Resume with Video on Hold
• Ad-hoc Conferencing
• Class of Service
• Shared and Multiple Lines
• Do not Disturb
• Directory dialing
• Speed Dials with BLF
• Voicemail
• E911
• Company Caller ID
• Auto-attendant and Hunt Groups
• Zero Touch Meetings
• Single Number Reach
• Spark App is the single soft-client for voice, video, meetings, & messaging
• Spark App is an “extension” of the desk phone
• Answer calls on desk phone or with Spark App
• Call anyone, anywhere
• Use Spark App to control the desk phone
• Intelligent Proximity
UC Features Collaboration Features Administrative Features• End User Self Care
• Customer and Partner Admin portal
• Customer Bulk Provisioning
• External Health Portal status.ciscospark.com
• Support and feedback through Spark App and support.ciscospark.com
• Ideal for mobile workers• Single app for voice, video, meetings, and messaging
• iOS, Android, and Windows Devices• Windows and Mac OS X
• Integrated mobile and desktop voice and video calling with Spark App
• Spark App is an “extension” of your phone• Answer calls on your desk phone or with Spark App• Call anyone, anywhere as if you were in the office
• Use App to control Spark registered desk phone
Spark App as a Soft Client
Apple Fast LaneNow Available with iOS10
Optimizing Wi-Fi Connectivity
Integrating Voice and Collaboration
Prioritizing Business Apps
Native Voice ExperienceIntuitive - use the iOS native dialer for Spark calls
Convenient - consolidated view of contacts, call history, and favorites
Control - call waiting allows user to screen and prioritize calls
Multi-functional - extends hands free experiences using Siri voice commands, Bluetooth and mobile accessories
Use connected headsets and accessories
• Cisco’s latest generation of IP phones• Cisco 7800 and 8800 Series of phones
• HD voice and video• H.264 video• G.722 wideband audio• G711u for PSTN calls
• Full phone feature support• Intelligent Proximity (Bluetooth)• USB and Analog Headsets• Wi-Fi support
Enterprise-Class Devices
BRKD 3
Cisco Spark Room Systems
MX200 MX300
MX800MX700 MX800 Dual
DX80DX70
SX80SX20SX10
Cloud Collaboration Management Portal
• Automated provisioning • License management (user/group) • Device management• Usage reports and analytics • Service monitoring and support Security & policy management
Effective cloud security made simpleCisco cloud security
Security
Gain security backed by the most advanced threat intelligence
00I00 I00I0I II0I0I 0II0I I0I00I0I0 0II0I0II 0I00I0I I0 00 II0III0I 0II0II0I II00I0I0 0I00I0I00 I0I0 I0I0 I00I0I00
III00II 0II00II I0I0II0II0 I0 I0 I00 00I0 I000 0II0 00
III00II I000I0I I000I0I I000I0I II 0I00 I0I000 0II0 00 00I I0I0I0 I0I0III000 I0I00I0I 0II0I0 I00I0I0I0I 000
II0II0I0I0I I0I0I0I 0I0I0I0I 0I0I00I0 I0I0I0I 0II0I0I0I
0II00 I00I0I0 0I00I0I I00I0I0 I0I0I0I 0I0I0I 0I0I0I000I0I0 0I0I0I0 I0I0I00I 0I0I 0I0I 0I0I I0I0I 0I00I0I
III00II 0II00II I0I000 0II0 00I0I00 I0 I000I0I 0II 0I0I0I
III00II 0II00II 0I0I0I0I 0I I0 I00 000II0 I0I0 0II0 00
24 7 365 Operations
100 TBOf Data Received Daily
1.5 MILLIONDaily Malw are Samples
600 BILLIONDaily Email Messages
16 BILLIONDaily Web Requests
MILLIONSOf Telemetry Agents
4Global Data Centers
Over 100Threat Intelligence Partners
250+Full Time Threat Intel Researchers
Globalscanning
30 years building the world’s networks
Cisco Advanced Malware Protection
Software-as-a-ServiceCloud Managed
Subscription Based
Unique to Cisco® AMP
Cisco AMP Delivers a Better Approach
Point-in-Time Protection
File Reputation, Sandboxing, and Behavioral Detection
Retrospective Security
Continuous Analysis
Speaker NameSpeaker Title Date
Threat-centric email security
Secure solutions for advanced email threats
Email is still the #1 threat vector
Phishing leaves businesses on the line
Phishing
Spoofing
Ransomware
Messages contain attachments and URL’s
Socially engendered messages are well crafted
and specific
Credential “hooks” give criminals access to your
systems
94% of phish mail has malicious attachments1
30% of phishing messages are opened1
$500M
Loss incurred due to phishing attacks in a year by US companies2
12016 Cisco Annual Security Report22016 Verizon Data Breach Report, Krebs on Security
Forged addresses fool recipients
Threat actors extensively research targets
Money and sensitive information are targeted
Spoofing rates are on the rise
2015 2016
In losses from spoofing 2013 - 20151
$2.3Bincrease1270%
1FBI Warns of Dramatic Increase in Business email scams, 2016
Phishing
Spoofing
Ransomware
Ransomware attacks are holding companies hostage
Malware encrypts critical files
Locking you out of your own system
Extortion demandsare being paid
$60M
Cost to consumers and companies of a single campaign2
9,515users are paying
ransoms per month2
Ransomware represents the biggest jump in occurrences of crimeware1
12016 Verizon Data Breach Report, Kerbs on Security22016 Cisco Annual Security Report
Phishing
Spoofing
Ransomware
And security is more complex with email moving to the cloud
Moving to Office 365 creates new risks Gartner estimates 60% cloud adoption by 20221
Access control Data leaks Infections Visibility and Audits
1Gartner Report “Office 365, Google Apps for Work and Other Cloud Office Key Initiative Overview” July 2015
Cisco Email Security is backed by unrivaled global threat intelligence
00I00 I00I0I II0I0I 0II0I I0I00I0I0 0II0I0II 0I00I0I I0 00 II0III0I 0II0II0I II00I0I0 0I00I0I00 I0I0 I0I0 I00I0I00
III00II 0II00II I0I0II0II0 I0 I0 I00 00I0 I000 0II0 00
III00II I000I0I I000I0I I000I0I II 0I00 I0I000 0II0 00 00I I0I0I0 I0I0III000 I0I00I0I 0II0I0 I00I0I0I0I 000
II0II0I0I0I I0I0I0I 0I0I0I0I 0I0I00I0 I0I0I0I 0II0I0I0I
0II00 I00I0I0 0I00I0I I00I0I0 I0I0I0I 0I0I0I 0I0I0I000I0I0 0I0I0I0 I0I0I00I 0I0I 0I0I 0I0I I0I0I 0I00I0I
III00II 0II00II I0I000 0II0 00I0I00 I0 I000I0I 0II 0I0I0I
III00II 0II00II 0I0I0I0I 0I I0 I00 000II0 I0I0 0II0 00
24 7 365 Operations
100 TBOf Data Received Daily
1.5 MILLIONDaily Malware Samples
600 BILLIONDaily Email Messages
16 BILLIONDaily Web Requests
MILLIONSOf Telemetry Agents
4Global Data Centers
Over 100Threat Intelligence Partners
250+Full Time Threat Intel Researchers
Deploy the world's largest email traffic monitoring network
Leverage industry-leadingthreat analytics
with SenderBase
Anti-spam processing / Context Adaptive Scanning Engine (CASE)
It’s built with industry-leading spam protection
Review sender reputation, URL reputation, and message content
Quarantine suspicious messages for additional review
Block spam with 99% accuracy with fewer than 1:1M false positives
Quarantine
Forward
BlockCisco Anti-Spam
Whosent the
message?
WhatIs the
content?
Howw as the message
constructed?
Wheredoes the call to action
take you?Cisco Email Security O365 Mail Server
And reduces your exposure to the three main components of an email attack
Attachments
URLswww.url.com
Email content
Effective cloud security made simpleCisco Cloud Web security
Perimeter security used to be effective
Headquarters Branch offices
By 2018, Gartner estimates:
25% of corporate data traffic will bypass perimeter security.
HQ BranchRoaming user
Security challenges have evolved
PaaSIaaSUsers Data Apps
SaaS
A system for relating names and numbers
Domain = IP Address Amazon.com =
205.251.242.103 Like a library of phone books
What is DNS?Domain Name System
DNS is used by every device on your network.
Malware validated as “known bad” –91% of all malware - use the Domain Name Service in one of these three ways:
• To gain command and control • To exfiltrate data • To redirect traffic
Few companies are monitoring DNS for security purposes (or monitoring DNS at all).
91%
DNS and Malware
INTERNET
MALWAREBOTNETS/C2PHISHING
SANDBOXPROXY
NGFWNETFLOW
AV AV
AV AV
AV
AV
AV AV
ROUTER/UTM
AV AV
ROUTER/UTM
HERE?
& HERE?
& HERE?
& HERE?
& HERE?
OR HERE?
Where Do You Enforce Security?
CHALLENGES
Too Many Alerts via Appliances & AV
Wait Until Payloads Reaches Target
Every Payload Scan Slows Things Down
Too Much Time to Deploy Everywhere
BENEFITS
Alerts Reduced 2x; Improves Your SIEM
Traffic & Payloads Never Reach Target
Internet Access Is Faster; Not Slower
Provision Globally in UNDER 30 MINUTES
HQ
Branch Branch
Mobile
Mobile
Protect users wherever they access the internet
Malware Phishing
C2 Callbacks
First line of defense against internet threatsUmbrella
SeeVisibility to protect access everywhere
LearnIntelligence to see attacks
before they launch
BlockStop threats before
connections are made
Cisco Umbrella Roaming208.67.222.222
MALWAREPHISHING
C2 CALLBACKS
Block Protection when off the VPN —no additional agents required
Visibility and enforcement at the DNS-layer
Block requests to malicious domains and IPs
Predictive intelligence —uncover current
and emergent threats
Cisco Umbrella Roaming Cloud-Delivered Security Service for Cisco NGFW
How It WorksSecurity Both On and Off the VPN
Users Easily Protected When Off The VPN
Off-network blind spot eliminated and users do nothing new
Threats blocked beforea connection is established
or a file is downloaded
VPNon
VPNoff*
DNSactive
*or split tunnel
Deploying Umbrella
AnyConnect 4.3 ISR4K
Cisco Umbrella BranchThe first layer of security for all
branch users without another box
Cisco Umbrella RoamingRoaming users protected 100% of the time without another agent
Co-Positioning with Cisco AMP
BEFOREPredictively prevent malicious Internet activity with Umbrella
DURINGBlock malicious files
with AMP
AFTERContain C2 callbacks with Umbrella
and retrospectively remediate with AMP
BAD DOMAIN
.COM
1 0 1 10 1 0 11 0 1 0
The Power of Umbrella Roaming + AMP for EndpointsSecurity Everywhere
How Umbrella + AMP for Endpoints Protect Against Ransomware
Exploit Kit Domains
Compromised Site or
Malvertising
Phishing Email
AnglerNuclear
Rig
RansomwarePayload
Web redirect
Web link
Email Attachment
Malicious Infrastructure
Encryption Key Infrastructure
C2File Drop
Cisco Umbrella AMP for Endpoints
C2
Gain visibility and controlto secure cloud apps and infrastructure.
PaaSIaaS
CloudLockCloud Access Security Broker (CASB)
Users Data Apps
SaaS
CloudLockSecure cloud users, data, and apps
Data breachesData security and compliance
Compromised accounts and insider threats
Threat protection and User and Entity Behavior Analytics (UEBA)
Shadow IT and application riskApp visibility and control
Protect the usage of business apps
in the cloud
SaaS
Protect the usage of critical infrastructure
in the cloud
IaaS /PaaS
The Cloud Security Fabric™
Cisco’s goal is to deliver effective security
Simple Open Automated
1 2 3
Trusted by enterprises worldwide
Fortune 500 companies in retail, healthcare, energy, and entertainment
Over 600 leadingprofessional services including law and consulting firms
Over 500 leading finance, banking, and insurance companies
Over 500 leadingmanufacturing and technology companies
The easiest security you’ll ever deploy.See results in minutes.Try it today.
Tackle ransomware and other threats with: UmbrellaGain cloud visibility and control with:CloudLock
Cisco Meraki
Cisco Confidential 79C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cloud Managed WiFi(2006)
Cloud Managed Network (2010)
Cloud Managed Enterprise
(2015)
MR Wireless LAN MS Ethernet Switches MX Security Appliances SM EMM MC Communications MV VideoSurveillance
Cisco Confidential 80C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Manage and monitor those networks with robust analytics from a single pane of glass
Reduce administrative overhead with simple all-inclusive licensing models and tools
Deploy and grow networks at branch locations or large campuses easily and rapidly
Cisco Confidential 81C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Wired, wireless, security, voice,
video & EMM
Client fingerprints
Security & bandwidth
policy
Instant search
Location analytics
Real-time controlIntegrated
MDM
Application visibility
Cisco Confidential 82C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Security
Reliability
Scalability
Future-proofing
Cisco Confidential 83C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Access and Aggregation switching
Gigabit access switches in 24 and 48 port configurations with available PoE/PoE+
Layer 2 and 3 options, 10GB uplinks, hot-swappable fans, power supplies
MS Access Switches
Layer 7 app visibility
Virtual and physical stacking
Cloning
PoE / PoE + on all ports
Remote packet capture, cable testing, troubleshooting
Voice and video QoS
Switch highlights
Cisco Confidential 84C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Application ControlTraffic Shaping, Content Filtering, Web Caching
SecurityNG Firewall, Client VPN, Site to Site VPN, IDS/IPS
NetworkingNAT/DHCP, 3G/4G Cellular, Static Routing, Link Balancing
Cisco Confidential 85C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Enterprise License Advanced Security License
Stateful firewall
Site to site VPN
Branch routing
Internet load-balancing (over dual WAN)
Application control
Web caching
Intelligent WAN (IWAN)
Client VPN
`
All enterprise features, plus
Content filtering (with Google SafeSearch)
Kaspersky Anti-Virus and Anti-Phishing
SourceFire IPS / IDS
Geo-based firewall rules
Advanced Malware Protection (AMP)
Cisco Confidential 86C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
3 Stream Triple-Radio802.11ac
MR66Dual-Radio802.11a/b/g/n
MR34
Cisco Meraki AP Lineup
2 Stream Triple-Radio802.11acBluetooth LE
MR32
2 Stream Triple-Radio802.11acBluetooth LE
MR72
Indoor APs
MR62Single-Radio802.11b/g/n
3 Stream Triple-Radio802.11ac Wave 2Bluetooth LE
MR42
Capabilities802.11ac Wave 2 MU-MIMO
Triple-radio architecture- 2.4 GHz client radio- 5 GHz client radio- Scanning/security radio
Enterprise wireless- Band steering & AutoRF- Traffic shaping & QoS- Secure login
Strong Security- Air Marshal, Geofencing
Connected Mobile Experiences (CMX)- Detect- Connect- Engage
Outdoor APs
Cisco Confidential 87C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Connected Mobile Experiences (CMX) with Cisco Meraki
Anonymous data about every visitor
Detect
APIs for real-time location based apps
Engage
Guest WiFi optimized for branding
Connect
100% cloud-managed user analytics and engagement with Cisco Meraki wireless networks
Key FeaturesLocation Analytics- People Counting- Heatmaps, Dwell Time- Peak times, repeat visitors- Micro-location mapping
(<1m)- Asset inventory and tracking- Analysis Tools
Engagement- Secure Branded Guest WiFi- Facebook Login for WiFi- Location aware apps- APIs for app development
Strong Security and Privacy- Secure public/private WiFi- Anonymous visitor analytics- Data privacy, global opt-out
Cisco Confidential 88C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Forget T1’s, E1’s, TDM, DSP’s, Media Gateways…
No Pre-VoIP Technology Involved
Not A PSTN CarrierWe aren’t providing trunks/connectivity, just the device and management
Excellent Hardware, SIMPLE softwareThe most intuitive and easy to use communications experience on the market
Cisco Confidential 89C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
• Streamlined deployment• Simplified management• Android or iOS like end user
experience• Single pane–of–glass management
with Meraki network
Managed through the cloud, integrated with the network
Cisco Confidential 90C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
• Basic call features (hold, transfer, multiple simultaneous incoming calls, caller ID)
• Visual Voicemail• Music On Hold• Automated attendant/IVR Menus• Conferencing• Phones assigned extensions (4-6
digits) and DIDs (10 digits)• Workgroups (beta)• Secure end to end calls via Secure
SIP (TLS) for signaling and SRTP for media streams
• More…
Cisco Confidential 91C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco’s EMM Solution: Meraki Systems Manager
A multi platform EMM solution powered by the cloud and designed for next generation networks
Cisco Confidential 92C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Easy and Rapid provisioning
Multi platform MDM support
Mobile and desktop management
Device security
Device Compliance
Bulk Application Delivery
Seamless Network Integration
100% Cloud-based
Feature highlights
Systems Manager Features
Conclusion
Thank You and Next Steps
Brian [email protected]
www.
Learn more about Cisco Cloud Solutions:www.cisco.com/go/cloud/
Contact Your Cisco Partnerhttps://tools.cisco.com/WWChannels/LOCATR/performBasicSearch.do
• CCE sessions are held weekly on a variety of topics• CCE sessions can help you understand the
capabilities and business benefits of Cisco technologies
• Watch replays of past events and register for upcoming events!
Visit http://cs.co/cisco101 for details
Join us again for a future Cisco Customer Education Event
Thank you.