Beruflich Dokumente
Kultur Dokumente
Digital Network
Readiness Model
Share
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
2
INFRASTRUCTURE
A digital-ready network
dynamically aligns to meet
the needs of the business.
Trends Fueling Digital Business “Given the promise of these accelerators to create new
61%
Security Big Data IoT Cloud Mobile Customer
The attack surface 84% of CEOs believe IDC forecasts as many 57% of organizations are 81% of CEOs believe that Demands
is increasing. that big data is delivering as 30 billion IoT devices using or planning to use mobility is strategic to
high or very high business by 2020. 4 public cloud or private their business, whether for 61% of CEOs believe
100% of the business value to their organization. 2 cloud solutions to support improving the workforce that changes in customer
networks analyzed by 65% of CEOs consider production workloads experience or customer behaviors are responsible
Cisco teams have traffic Big data storage will reach IoT strategic to and services.6 engagement. 8 for promoting disruption
going to websites that 73 ExaBytes by 2019. 3 their business. 5 in their industry.10
host malware. For organizations, According to the 2016
greater cloud adoption Cisco VNI Mobile Index
Ransomware is generates an average there will be an estimated
becoming rampant. US $1.6 million in additional 5.4 Billion mobile users
annual revenue and by 2020. 9
US $1.2 million in cost
savings per
cloud application.7
2. PWC: 18th Annual Global CEO Survey 4. IDC: Worldwide Internet of Things Forecast 9. IDC: Insight (Doc #259317 / Sep 30, 2015)
6 & 7. IDC InfoBrief, sponsored by Cisco, Don’t Get
Update, 2016–2020 8. PWC: 18th Annual Global CEO Survey IT’s 3rd Platform Drives Need for Network Innovation
3. IDC: Worldwide Storage in Big Data Forecast, Left Behind: The Business Benefits of Achieving
2015–2019 5. PWC: 18th Annual Global CEO Survey Greater Cloud Adoption, August 2015 9. Cisco VNI Mobile Index 10. PWC: 18th Annual Global CEO Survey
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
4
11 & 12. Gartner, Jouni Forsman, Survey Analysis: Networks for IoT and Digital Business, September 2015, G00289837.
13 & 14. Verizon Commissioned Study carried out by Forrester Consulting, September 2015.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
5
Why a Network
Readiness Model?
Risk
Cost &
Comp
lexity
t e s
ib u
t t r
A
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
8
Business
Best-effort
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Siloed device-centric
POLICY management
Management Wireless
Localized, LAN
Siloed Management
Device-centric
I NTERNET/
CLO UD
SERVICE ASSURANCE
AUTOMATION
IL
DETAIL
Siloed Hardware & Device Centric Architecture
A
ET
VIEW
D
Business
Digital Business X
Applications
Business Service
Requirements
Device-specific Perimeter
POLICY Threat
Event Analysis
Detection
Service
Roles & WAN
Alignment Application
Scope-based
Manual, Access Prioritization
Device-centric
Policy
Management Wireless
Localized, Siloed LAN
Device-centric Management
Multiple Functionally
Separate Systems
I NTERNET/
CLO UD
SERVICE ASSURANCE
3 AUTOMATION
S
O
Access Security SECURITY
Branch
ABSTRACTION Wireless Core/ Access
Edge ANALYTICS
Access Distribution
Infrastructure WAN
Wireless Network
Hardware & Controller
Security
Device-Centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
10
Business
Manual
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Centralized device-centric
POLICY management
Wide-spread service
assurance coverage
Firewall
Data Center
Management
Network
Router
SERVICE ASSURANCE
AUTOMATION
IL
DETAIL
End-to-End Hardware & Device Centeric
A
ET
VIEW
D
Business
Digital Business
X
Applications
Business Service
Requirements
Centralized
POLICY Access Network-wide
Control Threat Detection
Service
Network-wide
Alignment Centralized
Application
Manual, Event Analysis
Prioritization
Domain-centric
Policy
Firewall
Data Center
Management
Network
Router
LAN
Wireless
LAN
Management
Centralized
Management SaaS
Device-centric
Customers/Partners
I NTERNET/
CLO UD ACCESS CONTROL
SERVICE ASSURANCE
AUTOMATION
Business
Partially dynamic
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Domain-specific
POLICY controller-based automation
Internet/Cloud HUB
Partially Hardware
Manual-based
SERVICE ASSURANCE
AUTOMATION
IL
DETAIL
Hardware – Software Centric
A
ET
VIEW
D
Business
Digital Business X
Applications
Business Service
Requirements
Centralized
POLICY Policy Software-
Orchestration orchestrated
Quality of
Service Service
Alignment
Fragmented
Dynamic & Manual Analytics
Domain-centric Policy
End-to-end
Security
Management
Data Center
Network
Router
Management Controller-based
Unified Automation
Access / LAN
Management Management
Semi-automated:
Internet/Cloud HUB
Partially Hardware
Manual-based
SERVICE ASSURANCE
AUTOMATION
Business
Fully dynamic
Digital Business
business alignment
Applications across all domains
Business Service
Requirements
End-to-end controller-based
POLICY automation
Integrated Automation
Analytics
Fully enabled for the cloud
Management
Controller-based Detail View >
Policy-driven
Automation SaaS
Customers/Partners CO LO
Fully HUB
Internet/Cloud
Cloud-enabled
SERVICE ASSURANCE
AUTOMATION
IL
DETAIL
End-to-End Software Centric
A
ET
VIEW
D
Business
Digital Business X
Applications
Business Service
Requirements
POLICY
Service
Alignment
Dynamic
Cross-domain
Policy Alignment
Cloud
Clo ud
Policy-based
Cloud
Policy-based Service
Threat Detection, Assurance
Enforcement
Controller-based Clo ud
Integrated Automation
Analytics
Management
Controller-based
Policy-driven
Automation SaaS
Customers/Partners CO LO
Fully HUB
Internet/Cloud
Cloud-enabled
SERVICE ASSURANCE
AUTOMATION
Closed-loop Automation
Business
Continuous automated
Digital Business
business-to-service alignment
Applications
Business Service
Requirements
P r i va te/P u bl i c Closed-loop automation
Cloud Service
POLICY Assurance
Fully virtualized
Service
Alignment Self-optimizing service assurance
Autonomic Policy
Compliance Analytics Automation Real-time agile IT operations
Self-protecting networking
Management
Controller-based
Closed-loop
Automation SaaS
Customers/Partners CO LO
Cloud-enabled HUB
Internet/Cloud
SERVICE ASSURANCE
AUTOMATION
SECURITY
Unified Access Secure Edge
ABSTRACTION Unified Access
FA and Core FA ANALYTICS
BR BR Secure
IC
Infrastructure IC
BA BA Edge
S Network S
Dedicated and Off the ED ED
Shelf (OTS) Hardware Secure Edge
CAMPUS D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
17
IL
DETAIL
Closed-loop Automation
A
ET
VIEW
D
Business
Digital Business
X
Applications
Business Service
Requirements Closed Loop
Policy-based
Automation
Service
POLICY Business Intelligence,
Assurance Cloud Providers,
Threat, Market,
Telecom Providers,
Environmental
Service & Other Data
Corporate Systems
Alignment
Autonomic Policy
Compliance across Analytics Automation
all domains Public / Private /
Cloud–based IT Services:
Hybrid Cloud
Analytics, Security, IoT
Applications
Security
Network Services
Cross-domain Service
(Virtual Network
Orchestration
Functions)
Management
Controller-based
Closed-loop
Automation SaaS
Customers/Partners CO LO
Cloud-enabled HUB
Internet/Cloud
SERVICE ASSURANCE
AUTOMATION
SECURITY
Unified Access Secure Edge
ABSTRACTION Unified Access
and Core ANALYTICS
Secure
Infrastructure Edge
Dedicated and Off the Network
Shelf (OTS) Hardware Secure Edge
CAMPUS D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
18
SERVICE ALIGNMENT The alignment between what the applications and the business
require from the network and the services that the network can
deliver. Service alignment is evolving from a best-effort manual
alignment to very tight closed-loop integration between business
requirements (for example IT operations, application service levels,
and security policy and compliance requirements) and the
underlying network.
INFRASTRUCTURE The physical and virtualized network and network security components
of the enterprise network, including the campus, data center, WAN,
and branch networks.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
20
Business Outcomes
Improved results with each stage of the readiness journey
Simplifies network
The Increasingly in step Provides a platform operations and uses
with the business and for proactively protecting resources efficiently,
Digital Ready an integral part of the the business, its data, freeing funds and resources
Network business strategy. and users. to enable business
innovation.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
21
Technology Attributes
Advance with each step of the readiness journey
Digitization requires increased scalability, agility, and Mobile devices and applications are basic enablers For many industries, digital transformation is fueled
openness, which demands new ways of running the of new ways of working, new ways of engaging by new IoT initiatives. From remote patient monitoring,
network. Shifting to a cloud-based approach (private, customers, new business processes, and completely to predictive maintenance, to asset tracking and
public, or hybrid) to deliver network services such as new business models. Therefore, a digital-ready more, IoT makes enhanced and totally new business
policy management, virtualized network functions, network must be built with mobility in mind and enable models possible. To support these new IoT connected
security, and analytics can increase the agility of a an enhanced mobile experience from anywhere on devices, applications, and processes, the network
network, while making it more scalable and open to any device. And of course, a digital-ready network needs to adopt new capabilities that can provide the
third-party innovations. At the same time, the network needs to protect the business from the increased risk service levels and security they demand.
architecture needs to be properly designed to optimize that comes with opening up networks and data to
secure user access to applications and services employee, customer, and guest devices.
hosted in the public, private, or hybrid cloud.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
22
Business Service
users and processes are consistently met. Digital organizations need a network that
can deliver service levels aligned with explicit and implied business intent. Service
Requirements
Application assurance needs to be applied to all applications (productivity, mobile, cloud,
Service Levels
collaboration, IoT, etc.) and services (B2B, B2C, M2M, P2P, virtualized, rich media,
IoT, personal, etc.) across users, devices, and locations.
When an organization creates a new service or process,
embarks on a project to improve customer relationships, Policy applies to the organization’s security decisions about employee, partner, and
chooses a new security policy, is faced with a new regulation, visitor roles and responsibilities and about application, data, and network access
needs valuable real-time data, enters the world of IoT, etc., and use. Policies need to covers all network systems and data in the organization
the organization needs to help ensure that the network can as well as regulations defined by third-party governmental and trade organizations.
conform to these requirements and policies. Traditionally, this Traditionally, policies have been applied as fragmented network security mechanisms
assurance was achieved in a hit and miss, manual way, by IT Policy through manually managed access policies and enforcement mechanisms. In an
attempting to manually translate the policy requirements into and Compliance increasingly connected and mobile world with growing risk, digital organizations
network configurations. This approach inevitably slows down need ways to apply and enforce policies and achieve regulatory compliance in a
and can even derail these initiatives because so much intent real-time, dynamic and automated way.
and time can be lost in the translation. To overcome these
impediments, a digital-ready network needs to be able to
For IT to keep up with the rate of change and with the new demands of the digital
adapt to continuously understand the policies and needs of
network, it needs to make its operations more agile and responsive. IT needs to
the business and make the necessary changes on an ongoing
replace time-consuming manual and error-prone processes with ones that are
basis. Business service categories that can be policy-driven
simpler and more automated. IT needs to create operating models and technology
include applications service levels, policy and compliance
capabilities that allow much greater integration between business requirements and
IT
and IT operations.
Operations network services. Such capabilities include self-service service catalogs; day-zero,
day-one, and day-two operations automation; and IT workflows.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
23
Resources
Use the following resources for more information and to help
guide you on your journey to digital network readiness.
Get an insider’s perspective on how to use View Infographic from IDC Research
the Digital Network Readiness Model
Share
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
24
Can you support our digital business ambitions? How can your network technologies support our Security
digital requirements?
oo Do you have a vision and roadmap for networking that will oo Does your network provide security and protection for the
Architecture edge and the core?
support digital transformation?
oo Do you help customers achieve a smooth network evolution o o Is your network architecture end-to-end, meaning from oo Can your network act as a networkwide security sensor
to a software-delivered architecture? clients to cloud (access, core, WAN, branch office, data and intelligence dashboard?
center, cloud)? oo Can your network enforce contextual security policy and
o o Can your network architecture deliver lower cost and
complexity, reduced risk and enable faster innovation? oo Does your architecture enable end-to-end automation? respond to contain threats?
oo Can your network deliver valuable IT and business analytics? oo Is your architecture open and standards-based? Analytics
oo Can your partners and services ecosystem help me evolve oo Is your architecture designed to support a controller-based
to a digital-ready network? programmable network? oo Can your network provide clear visualization of activity,
networkwide?
oo Can you help with developing our network team’s skill set oo Is your architecture built to support virtualization?
to support a programmable network? oo Can your network identify threats and anomalies in real-time?
oo How does your architecture enable mobile, cloud, Big Data
oo Do you have a proven record as a trusted partner for the oo Can your network support distributed and cloud-based IoT
and IoT?
long term, to support IT through the journey to digital? analytics?