SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Unified Management for Borderless Networks Cisco Prime Network Control System
Disclaimer Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
Agenda Mobile devices created challenges when using focused tools Understanding Cisco Prime  Cisco Prime Network Control System (NCS)  Addressing client access issues with Cisco Prime NCS Cisco Prime NCS v1.0 deep dive Comprehensive Wireless Lifecycle Management Scalability, Deployment Options and Services Summary
Influx of Mobile Devices Creates IT Challenge  IT Consumerization: Now a Reality Smartphone adoption is growing at 50%+ annually* By 2015, tablets will constitute 50% of laptop sales** ORGANIZATION TIME
The User to Device Ratio Has Changed IT Resources Stay The Same Borderless User ,[object Object]
One user: Many devicesFixed User ,[object Object]
One user: One deviceMobile User ,[object Object]
One user: Local devicesAccess Evolution Early 90’s  Today Late 90’s Effectively support users with box management Need for policy & control Need for operational efficiency
What is Cisco Prime? Cisco Prime ….. ,[object Object]
Supports enterprise and service providers
Delivers service-centric foundation and set of common operational attributesCisco Prime offers….. ,[object Object]
Integrated lifecycle management across Cisco architectures and technologies
Intuitive workflow-oriented user experienceCisco Prime benefits… ,[object Object]
Increased operations efficiencies
Lowered total cost of ownership For more information visit Cisco Prime Websites
Cisco Prime for Enterprise Product Feature Summary 100% support Partial support 1 1 2 3 1 Day-one support for selected products only 2  Includes sub-set of Smart Interactions features 3  In conjunction with  Cisco Identity Services Engine (ISE)
Cisco Prime Network Control System Converged Access Management for Wired and Wireless Networks  Wireless | Wired | Security Policy | Network Services Unified Management Operations Users Policy Improved Network Visibility  Faster Troubleshooting  Eliminate Configuration Errors
Networks are Converging Wireless considered as an EQUAL MEANS of ACCESS Aligning to Today’s Operational Environment Teams are Converging Cost pressure requires a ”DO MORE WITH LESS” operational model              Visibility Must Converge Focused solutions will deliver DIMINISHING RETURNS
Aligning to Today’s Operational Environment One Network  One Team One Solution
Client Devices: Top Contributor to Network Performance Problems  A recent survey shows that respondents view client devices as the TOP contributor to wireless network performance problems
From “Box Management” to “User-focused Management” Integrated Wired & Wireless Monitoring and Troubleshooting  Any End-user Device Any Location Any Network Wired Access Wireless Access Remote Access UNIQUE PERSPECTIVE  Extends to USERS and ENDPOINTS
Evolving User Access Management Traditional Approach Cisco Prime NCS Approach Network Generalist Wired  Expert Wireless  Expert Security  Expert Converged Access  Visibility  Wireless  Management  Security  Policy  Wired Devices ,[object Object]
Single view of critical data
Improves IT efficiency
Consumes lots of time and resources
Manual correlation of data
Inefficient operational model,[object Object]
Optimize Network Operations Troubleshooting Laptop Connectivity Issues Example Traditional Approach  Multiple teams/tools to provide resolution: Wireless NetOps – WCS with MSE Verify user credentials Confirm laptop associates to network Observe time laptop may connect Validate current location Wired NetOps – LMS  Check port and connectivity Security Ops – NAC and ACS View Check laptop conforms to AUP Confirm access to VLAN for resource/application is permitted Where? LMS MSE ? ? How? ? ? Who? ? WCS NAC When? What? WCS
Cisco Prime NCS Approach  One platform with consolidated view for immediate resolution: ,[object Object]
Connectivity confirmed
Endpoint complies with AUP
Permitted time of day
Impermissible location for laptop
Problem identified/Case closedHow? Where? What? When? Who? Optimize Network Operations Troubleshooting Laptop Connectivity Issues Example Unified Management
Cisco Prime Network Control System v1.0
Enhanced User Experience Information architecture: Seamless navigation and workflows align to tasks Modern interaction behavior: Maintains context while performing network management tasks Smart tables & advanced filtering: Quickly view additional information without leaving the workflow Ever-present alarm views & browser: Always-on visibility to potential end-user problems to speed remediation Designed to Work With How IT Approaches Problems Empower first-tier support teams to solve more problems Release upper-tier teams to focus on strategic projects

Weitere ähnliche Inhalte

Andere mochten auch

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acCisco Mobility
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSCisco Mobility
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureCisco Mobility
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksCisco Mobility
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesCisco Mobility
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersCisco Mobility
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksCisco Mobility
 
Cisco non-standard template
Cisco non-standard templateCisco non-standard template
Cisco non-standard templateKVEDesign
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?Karri Huhtanen
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
 

Andere mochten auch (16)

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless Networks
 
Pace IT - Troubleshooting Security
Pace IT - Troubleshooting SecurityPace IT - Troubleshooting Security
Pace IT - Troubleshooting Security
 
Cisco non-standard template
Cisco non-standard templateCisco non-standard template
Cisco non-standard template
 
What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
 

Mehr von Cisco Mobility

Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolCisco Mobility
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco Mobility
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Cisco Mobility
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsCisco Mobility
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksCisco Mobility
 

Mehr von Cisco Mobility (9)

Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case study
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile Solutions
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
 

Kürzlich hochgeladen

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Kürzlich hochgeladen (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Cisco Prime NCS: Converged User, Access and Policy Management

  • 1. Unified Management for Borderless Networks Cisco Prime Network Control System
  • 2. Disclaimer Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
  • 3. Agenda Mobile devices created challenges when using focused tools Understanding Cisco Prime Cisco Prime Network Control System (NCS) Addressing client access issues with Cisco Prime NCS Cisco Prime NCS v1.0 deep dive Comprehensive Wireless Lifecycle Management Scalability, Deployment Options and Services Summary
  • 4. Influx of Mobile Devices Creates IT Challenge IT Consumerization: Now a Reality Smartphone adoption is growing at 50%+ annually* By 2015, tablets will constitute 50% of laptop sales** ORGANIZATION TIME
  • 5.
  • 6.
  • 7.
  • 8. One user: Local devicesAccess Evolution Early 90’s Today Late 90’s Effectively support users with box management Need for policy & control Need for operational efficiency
  • 9.
  • 10. Supports enterprise and service providers
  • 11.
  • 12. Integrated lifecycle management across Cisco architectures and technologies
  • 13.
  • 15. Lowered total cost of ownership For more information visit Cisco Prime Websites
  • 16. Cisco Prime for Enterprise Product Feature Summary 100% support Partial support 1 1 2 3 1 Day-one support for selected products only 2 Includes sub-set of Smart Interactions features 3 In conjunction with Cisco Identity Services Engine (ISE)
  • 17. Cisco Prime Network Control System Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services Unified Management Operations Users Policy Improved Network Visibility  Faster Troubleshooting  Eliminate Configuration Errors
  • 18. Networks are Converging Wireless considered as an EQUAL MEANS of ACCESS Aligning to Today’s Operational Environment Teams are Converging Cost pressure requires a ”DO MORE WITH LESS” operational model Visibility Must Converge Focused solutions will deliver DIMINISHING RETURNS
  • 19. Aligning to Today’s Operational Environment One Network  One Team One Solution
  • 20. Client Devices: Top Contributor to Network Performance Problems A recent survey shows that respondents view client devices as the TOP contributor to wireless network performance problems
  • 21. From “Box Management” to “User-focused Management” Integrated Wired & Wireless Monitoring and Troubleshooting Any End-user Device Any Location Any Network Wired Access Wireless Access Remote Access UNIQUE PERSPECTIVE Extends to USERS and ENDPOINTS
  • 22.
  • 23. Single view of critical data
  • 25. Consumes lots of time and resources
  • 27.
  • 28. Optimize Network Operations Troubleshooting Laptop Connectivity Issues Example Traditional Approach Multiple teams/tools to provide resolution: Wireless NetOps – WCS with MSE Verify user credentials Confirm laptop associates to network Observe time laptop may connect Validate current location Wired NetOps – LMS Check port and connectivity Security Ops – NAC and ACS View Check laptop conforms to AUP Confirm access to VLAN for resource/application is permitted Where? LMS MSE ? ? How? ? ? Who? ? WCS NAC When? What? WCS
  • 29.
  • 34. Problem identified/Case closedHow? Where? What? When? Who? Optimize Network Operations Troubleshooting Laptop Connectivity Issues Example Unified Management
  • 35. Cisco Prime Network Control System v1.0
  • 36. Enhanced User Experience Information architecture: Seamless navigation and workflows align to tasks Modern interaction behavior: Maintains context while performing network management tasks Smart tables & advanced filtering: Quickly view additional information without leaving the workflow Ever-present alarm views & browser: Always-on visibility to potential end-user problems to speed remediation Designed to Work With How IT Approaches Problems Empower first-tier support teams to solve more problems Release upper-tier teams to focus on strategic projects
  • 37.
  • 38. Simple, intuitive user interface: Eliminates complexity
  • 39. User-defined customization: Display the the most relevant information19 © 2011 Cisco Systems, Inc. All rights reserved. Lumos Features DRAFT Cisco Confidential
  • 40. Unified User and Endpoint Services Correlated and focused wired / wireless client visibility Client health metrics Client posture & profile Client troubleshooting Client Reporting Unknown device ID input Clear view of the end-user landscape Who is connecting Using which device Are they authorized
  • 41. Integrated Access Infrastructure Visibility Wired & wireless discovery and inventory Add / detect infrastructure devices such as switches, WLAN controllers and access points Comprehensive access infrastructure reporting View the access infrastructure as a whole or as discrete technologies Stolen asset notification Track when devices presumed stolen come back online 21 © 2011 Cisco Systems, Inc. All rights reserved. Lumos Features DRAFT Cisco Confidential
  • 42. Spatial Maps Provides Context as to Where the Wired Endpoint Resides Associate access wired infrastructure and clients with a floor or building
  • 43. Identity Services Engine Integration Converged Security and Policy Monitoring and Troubleshooting Streamline Service Operations Enhance Infrastructure Security Enforce Compliance Shows where security & policy problems exist Retrieves information directly from clients: Wired, wireless - authenticated, unauthenticated Reduces the time to troubleshoot security & policy problems Client posture status and client profiled views Drill deeper into security & policy issue details Direct linkage from Cisco NCS to Cisco ISE with contextual filtering
  • 44. Comprehensive Wireless Lifecycle Management Full Range of Lifecycle Capabilities
  • 45.
  • 46. Configure access point placement, coverage, and other variables
  • 47.
  • 48.
  • 49. Monitoring and Troubleshooting Quickly Access the Information You Need – When You Need IT Coverage Visualization Centralized Monitoring of the entire WLAN and LAN Identify and diagnose RF Interference events, air quality and interference security threats with Cisco CleanAir Robust fault event and alarm management Guided step-by-step client troubleshooting tools Ever-present search for cross network historical information Cisco ISE and ACS views for additional endpoint data Color-Coded Icons Ever-present Alarm Summary Efficiently assess, prioritize and manage RF interference issues Analyze problems and misconfigurations for all client devices across all connection media Troubleshoot large-scale LAN and WLAN environments with minimal IT staffing Quickly discover events occurring outside baseline parameters
  • 50. Ever-Present Search Simplified Customization of Display Mapping HierarchyandIcons (Expandable) Easily Monitor Each Location Quick Access To Tools Ever-Present Alarm Summary(Expandable) Heat Map of Each Location
  • 51. Remediation Returning the Network to Optimal Performance Streamlined Workflows 1 Integrated workflows and tools: Receive performance degradation notices Quickly asses service disruptions Research resolution Take action CleanAir alerts summaries and reports identify where poor air quality and interferers exist Security dashboard and index show current security status Voice Tools for customized queries to address VoWLAN problems 2 3 Security Dashboard Diagnose the RF environment and mitigate interference from Wi-Fi and non-WiFi sources Quickly assess and understand ways to improve the security index of the network Quickly discover events occurring outside baseline parameters
  • 52. OptimizeContinuous Improvement Long term historical reporting and trend analysis Extensive on-demand and automatic reporting Fully customizable Focused compliance reporting Alarm and event forwarding to 3rd-party solutions Output to CSV of PDF Effectively plan for future capacity, while properly controlling costs Align the reporting structure to your business or operational environment Understand common trends and top users of resources to right-size the network environment
  • 53. Services Management and Integration
  • 54. Unprecedented Scalability Complete lifecycle management of hundreds of wireless LAN controllers from a centralized location Rich monitoring and troubleshooting for Cisco Catalyst Switches Visibility into key performance metrics – interface ports, endpoints and users and switch inventory
  • 55. Virtual Appliance Physical Appliance Appliance Delivery Models Physical and Virtual Application & Components Application & Components Cisco Provided Cisco Provided OS OS Customer Provided Cisco-branded Hardware (1RU) Virtual Infrastructure Discontinuation of software binaries - Replaced by new Complete Appliance Model -
  • 56. Cisco WCS to Cisco Prime NCS Migration 34 Cisco Prime NCS Cisco WCS 7.0.X Licenses Multi-tier License Model Singlei-tier License Model WCS Base License (Examples: WCS-APBASE-X or WCS-WLSE-APB-X) Prime NCS License (Example: L-NCS-1.0-X) WCS Plus License (Examples: WCS-Plus-X or WCS-WLSE-Plus-X) Database* Must be on WCS 7.0.164.0 or 7.0.164.3 1:1 Upgrade *Note: WCS 7.X is the last release running on CiscoWorks Wireless LAN Solution Engine (WLSE) © 2011 Cisco Systems, Inc. All rights reserved. Lumos Features DRAFT Cisco Confidential
  • 57.
  • 58.
  • 59. Visibility at the access layer as networks become borderless
  • 60. Address problems where most issues occur - The endpoint
  • 61. Single viewpoint for wired, wireless, security& policy management
  • 63. Direct access to Cisco support and services
  • 64. Empower first-tier to address issues without escalation
  • 65. Resolve problems faster with logical workflows

Hinweis der Redaktion

  1. Source: *Apple Inc. Quarterly Financial Report, ** The US PC Consumer Market in 2015 – Forrester Research
  2. Based on Peggy Casey draft 3/22/11 v.8b (final)Fully ScriptedCisco Prime is a new strategy for innovative network management. Cisco Prime supports enterprise and service provider organizations. The strategy was announced in the Fall of 2010 for service providers and Cisco Prime for Enterprise will be announced in April 2011. The Cisco Prime portfolio ofmanagement products are based on a service-centric foundation and support integrated lifecycle management of Cisco architectures and technologies. Cisco Prime products are built on an intuitive workflow-oriented user experience. Benefits of Cisco Prime products include: Simplified and predictable network management through a set of common attributes that deliver operational advantages and control across architectures, networks and services Increased operations efficiencies through reduced network errors, faster troubleshooting, and improved delivery of services Lowered total cost of ownership by maximizing the value of the existing network investment and integration with existing operational systems and processesCisco Prime Websites:Internal CEC - NMTG: http://wwwin.cisco.com/nmtg/prime.shtml External Cisco.com (Live 4/19/11): http://www.cisco.com/go/prime
  3. Here is a table of the Cisco Prime for Enterprise product features mapped to each product. Cisco Prime Network Control System (NCS) 1.0Cisco Prime LAN Management Solution (LMS) 4.1Cisco Prime Collaboration Manger (CM) 1.0. Cisco Prime Network Analysis Module (NAM) 5.1
  4. A recent survey taken by Cisco users revealed that a majority of performance issues are caused at the endpoint [or user device].
  5. Empower first-tier teams to resolve problems more often, without escalation, with intuitive workflows
  6. Enable reliable and secure access to business services from anywhere with a single view of users, their devices and their access credentials
  7. Unified and/or focused visibility of clients Detect wired and wireless endpoints connected to the networkView reports, lists and alarms associated Wired & wireless discovery and inventoryAdd / detect infrastructure devices such as switches, WLAN controllers and Access Points Comprehensive infrastructure reporting View the access infrastructure as a whole or as discrete technologies
  8. Google Earth integration