Sie sind auf Seite 1von 24

Cisco

Digital Network
Readiness Model

Let’s get started

Share
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
2

Why Evolve to a Digital-Ready


Network Architecture?
The digital value at stake from the overall private sector for 2015
to 2024 is estimated at an enormous US $23.8 trillion.1
BUSINESS SERVICES
Every aspiring organization, large or small, faced with the opportunities and
challenges of digital business needs a digital-ready network. Agile, secure
networks simplify IT and enable rapid innovation. Without a network that can
actively enable and protect your business strategy, the applications, cloud SERVICE ALIGNMENT

services, and devices you deploy cannot live up to their potential.

Get a view into the Digital MANAGEMENT

Network Readiness Model and Digital Network


how it can benefit you. Readiness Model

INFRASTRUCTURE
A digital-ready network
dynamically aligns to meet
the needs of the business.

1. Connected Futures Magazine: Private Sector Digital Value at Stake (PDF)


Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
3

Trends Fueling Digital Business “Given the promise of these accelerators to create new

and the Digital Network


competitive opportunities or serve as catalysts to solving
a wide range of global and commercial needs, having the
right network architecture to support these workloads will
be of paramount importance.” 9

100% 84% 65% 57% 81%

61%
Security Big Data IoT Cloud Mobile Customer
The attack surface 84% of CEOs believe IDC forecasts as many 57% of organizations are 81% of CEOs believe that Demands
is increasing. that big data is delivering as 30 billion IoT devices using or planning to use mobility is strategic to
high or very high business by 2020. 4 public cloud or private their business, whether for 61% of CEOs believe
100% of the business value to their organization. 2 cloud solutions to support improving the workforce that changes in customer
networks analyzed by 65% of CEOs consider production workloads experience or customer behaviors are responsible
Cisco teams have traffic Big data storage will reach IoT strategic to and services.6 engagement. 8 for promoting disruption
going to websites that 73 ExaBytes by 2019. 3 their business. 5 in their industry.10
host malware. For organizations, According to the 2016
greater cloud adoption Cisco VNI Mobile Index
Ransomware is generates an average there will be an estimated
becoming rampant. US $1.6 million in additional 5.4 Billion mobile users
annual revenue and by 2020. 9
US $1.2 million in cost
savings per
cloud application.7

2. PWC: 18th Annual Global CEO Survey 4. IDC: Worldwide Internet of Things Forecast 9. IDC: Insight (Doc #259317 / Sep 30, 2015)
6 & 7. IDC InfoBrief, sponsored by Cisco, Don’t Get
Update, 2016–2020 8. PWC: 18th Annual Global CEO Survey IT’s 3rd Platform Drives Need for Network Innovation
3. IDC: Worldwide Storage in Big Data Forecast, Left Behind: The Business Benefits of Achieving
2015–2019 5. PWC: 18th Annual Global CEO Survey Greater Cloud Adoption, August 2015 9. Cisco VNI Mobile Index 10. PWC: 18th Annual Global CEO Survey
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
4

Network Evolution for What Does


Digital Transformation This Mean?
According to Gartner, “networks and communications If digital transformation were not a reality, The business is expecting much more
have an important role to play in digital business and just continuing to focus on providing high because rigid, complex, slow-to-deploy-
performance and reliable connectivity might and-configure networks can no longer do
the Internet of Things (IoT). Organizations rank them
be sufficient. But that’s not the case. Business the job. The business is saying, “In the future,
higher in accelerating digital business than business
67% leaders are now saying, “Thanks for all the I need a network that ‘hears and speaks’ the
applications, operational technology applications or years of service. But we need much more language of the business.” What does that
cloud.”11 At the same time, however, “Less than 10% from the network if we are going to succeed mean? Well, when the business creates
of enterprises that have implemented or plan to implement in the digital era.” a new service or process, embarks on a
project to improve customer relationships,
digital business have very clear integration between
67% of business adopts a new security policy, is faced with a
their network and digital business strategies.” 12
And
leaders believe the new regulation, needs real-time data, enters
according to a Forrester survey, most organizations the world of IoT, or embraces any other new
current network
believe that it’s IT leadership that has the expertise initiative, the network must intrinsically
is a bottleneck
and experience to make sure that this integration understand what needs to be done—and
in Enterprise IT.
14

then just do it. This transformation will require


between business and IT occurs: “Nearly 4/5 of business
networks that are open and extensible and
leaders believe that it is IT’s responsibility to ensure the
able to dynamically adjust based on business
network can support the company’s digital plans.”13 rules with little manual intervention.

11 & 12. Gartner, Jouni Forsman, Survey Analysis: Networks for IoT and Digital Business, September 2015, G00289837.

13 & 14. Verizon Commissioned Study carried out by Forrester Consulting, September 2015.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
5

Changing the Fundamental Recognizing the need for a transformative network


architecture, Cisco announced the Cisco® Digital Network
Principles of Networking Architecture (DNA). This architecture is based on a
number of basic principles that contribute to delivering a
network ready for the digital age.

Virtualize Designed for Pervasive Service Management Open, Extensible


Everything Automation Analytics Delivered From and Programmable
the Cloud at Every Layer
By decoupling hardware from software, Automation makes networks and Provide insights into the operation of Unify policy and orchestration across Integrate Cisco and third-party
give organizations freedom of choice services on those networks easy the network, IT infrastructure, and the the network, enabling both the agility technology, open APIs, and a developer
to run any service anywhere, independent to deploy, manage, adapt, and business to help IT and the business of cloud and the security and control platform to support a robust ecosystem
of the underlying platform: physical or maintain, fundamentally changing the make better, faster decisions using of on-premises solutions. of network-enabled and cloud-enabled
virtual, on premises or in the cloud. approach to network management. information that only the network applications. Enable open interfaces
Controller-based networking simplifies can provide. Use the distributed power so that business applications and
management through abstraction and of the network to create value from services can communicate service
automation and provides a platform the masses of data delivered through and policy requirements directly to
for consistent service alignment and Internet of Things (IoT) initiatives. the network.
policy enforcement. This approach Respond quickly to contain threats
accelerates application and service by using the all-seeing network to
rollout while reducing risk. IT staff gain identify anomalies.
the time to focus on enabling business
strategy instead of operations.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
6

Why a Network
Readiness Model?

Most organizations are early in their journey to a digital-ready


network. And the evolution to a network that can fully meet the
requirements of digital initiatives will require the coming together
of many technologies and process changes over time. Just as data
center consolidation, virtualization, and automation has been a
multiyear journey for most organizations, we can expect that it will
take some time for most organizations to complete the digital
network journey. However, the journey delivers important near term
gains on the road to network transformation.

The Cisco Digital Network Readiness Model has been created to


help customers gain a clearer picture of where they are on this
journey and gain visibility into the opportunities and benefits of
evolving to the next stage. The model is intended as a framework
and guide that each organization can use and customize to suit its
own needs and priorities.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
7

Cisco Digital Network


Readiness Model
The stages of the Cisco Digital Network Readiness Model D I G I TA L E R A
follow the standard five stages of maturity adopted broadly
in business and IT consulting communities. It borrows heavily A u to m a te d Self-Driving
t o m a t e d
from IDC Research’s maturity framework and taxonomies.
m i -A u Continuous service
The taxonomy Cisco has adopted to describe the five S e Fully dynamic service
alignment
alignment
phases refers primarily to the level of business
u a l
and network alignment.
M an Partially dynamic service
End-to-end automation Closed-loop automated
alignment service assurance
Rapid threat detection
o r t Domain-specific Self-protecting network
Eff Manual service alignment and containment
automation
s t
A
Be Centralized device- End-to-end QoS
Fully integrated IT and
business analytics
Fully enabled for cloud
ER centric management
N
ATIO
R M
O
I NF Best-effort business-to- Centralized access policy Automat
ion
service alignment
Securit
y
Siloed manual device- Service A
ssuranc
e
centric management
Analyti
cs
r e
e ctu
h it
A rc Agilit y
/ I n n ov
ation

Risk
Cost &
Comp
lexity

t e s
ib u
t t r
A
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
8

Stage 1: Best Effort Stage 1 2 3 4 5

Siloed Hardware & Device Centric Architecture

Business
Best-effort
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Siloed device-centric
POLICY management

Service Fragmented IT operations


Alignment
Manual, Perimeter-focused security
Device-centric
Policy
Patchy service
assurance coverage

Firewall Data Center


Management Network
Management Detail View >
LAN Branch
Management Router / WAN
Management

Management Wireless
Localized, LAN
Siloed Management
Device-centric

I NTERNET/
CLO UD

SERVICE ASSURANCE

AUTOMATION

Access Security SECURITY


Branch
ABSTRACTION Wireless Core/ Edge Access
Distribution ANALYTICS
Access
Infrastructure Wireless
WAN
Network
Hardware & Controller
Security
Device-Centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
9

Stage 1: Best Effort Stage 1 2 3 4 5

IL
DETAIL
Siloed Hardware & Device Centric Architecture

A
ET
VIEW

D
Business
Digital Business X
Applications
Business Service
Requirements

Device-specific Perimeter
POLICY Threat
Event Analysis
Detection
Service
Roles & WAN
Alignment Application
Scope-based
Manual, Access Prioritization
Device-centric
Policy

Firewall Data Center


Management Network
Management
LAN Branch
Management Router / WAN
Management

Management Wireless
Localized, Siloed LAN
Device-centric Management
Multiple Functionally
Separate Systems
I NTERNET/
CLO UD

SERVICE ASSURANCE

3 AUTOMATION
S
O
Access Security SECURITY
Branch
ABSTRACTION Wireless Core/ Access
Edge ANALYTICS
Access Distribution
Infrastructure WAN
Wireless Network
Hardware & Controller
Security
Device-Centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
10

Stage 2: Manual Stage 1 2 3 4 5

End-to-End Hardware & Device Centeric

Business
Manual
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Centralized device-centric
POLICY management

Service End-to-end manual


Alignment IT operations
Manual,
Domain-centric Centralized access policy
Policy

Wide-spread service
assurance coverage
Firewall
Data Center
Management
Network
Router

LAN Detail View >


Wireless
LAN
Management
Centralized
Management SaaS
Device-Centric
Customers/Partners
I NTERNET/
CLO UD ACCESS CONTROL

SERVICE ASSURANCE

AUTOMATION

Access Security SECURITY


ABSTRACTION Core/ Branch
Wireless Edge Access ANALYTICS
Access Distribution
Infrastructure Wireless
Hybrid
Network WAN
Hardware & Controller
Security
Device-centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
11

Stage 2: Manual Stage 1 2 3 4 5

IL
DETAIL
End-to-End Hardware & Device Centeric

A
ET
VIEW

D
Business
Digital Business
X
Applications
Business Service
Requirements
Centralized
POLICY Access Network-wide
Control Threat Detection

Service
Network-wide
Alignment Centralized
Application
Manual, Event Analysis
Prioritization
Domain-centric
Policy

Firewall
Data Center
Management
Network
Router

LAN
Wireless
LAN
Management
Centralized
Management SaaS
Device-centric
Customers/Partners
I NTERNET/
CLO UD ACCESS CONTROL

SERVICE ASSURANCE

AUTOMATION

Access Security SECURITY


Branch
ABSTRACTION Wireless Core/ Access
Edge ANALYTICS
Access Distribution
Hybrid
Infrastructure Wireless WAN
Network
Hardware & Controller
Security
Device-centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
12

Stage 3: Semi-Automated Stage 1 2 3 4 5

Hardware – Software Centric

Business
Partially dynamic
Digital Business
business-to-service
Applications alignment
Business Service
Requirements
Domain-specific
POLICY controller-based automation

Service Domain-specific flexible


Alignment IT operations
Dynamic & Manual
Domain-centric Policy Edge-to-core security
management

End-to-end Simplified end-to-end quality


Security
of service (QoS)
Management
Data Center
Network Fragmented IT and business
Router
Management Controller-based network-enabled analytics
Unified Automation
Access / LAN
Management Management Partially enabled for the cloud
Semi-automated:

SaaS Detail View >


Partially Software
Controller-based Customers/Partners CO LO

Internet/Cloud HUB
Partially Hardware
Manual-based
SERVICE ASSURANCE

AUTOMATION

Unified Access Security SECURITY


Unfied
ABSTRACTION Edge Access
Core/ ANALYTICS
Distribution
Infrastructure SD-WAN
Network
Hybrid Software/
Security
Hardware-centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
13

Stage 3: Semi-Automated Stage 1 2 3 4 5

IL
DETAIL
Hardware – Software Centric

A
ET
VIEW

D
Business
Digital Business X
Applications
Business Service
Requirements
Centralized
POLICY Policy Software-
Orchestration orchestrated
Quality of
Service Service
Alignment
Fragmented
Dynamic & Manual Analytics
Domain-centric Policy

End-to-end
Security
Management
Data Center
Network
Router
Management Controller-based
Unified Automation
Access / LAN
Management Management
Semi-automated:

Partially Software SaaS


Controller-based Customers/Partners CO LO

Internet/Cloud HUB
Partially Hardware
Manual-based
SERVICE ASSURANCE

AUTOMATION

Unified Access Security Unified SECURITY


Access
ABSTRACTION Edge
Core/ ANALYTICS
SD-WAN
Distribution
Infrastructure
Network
Hybrid Software/
Security
Hardware-centric
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
14

Stage 4: Automated Stage 1 2 3 4 5

End-to-End Software Centric

Business
Fully dynamic
Digital Business
business alignment
Applications across all domains
Business Service
Requirements
End-to-end controller-based
POLICY automation

Service Partially virtualized


Alignment
Dynamic Rapid threat detection and
Cross-domain containment
Policy Alignment
Cloud
Clo ud Policy-based quality of
Policy-based experience (QoE)
Cloud
Policy-based Service
Threat Detection, Assurance
Enforcement Integrated IT and business
analytics
Controller-based Clo ud

Integrated Automation
Analytics
Fully enabled for the cloud
Management
Controller-based Detail View >
Policy-driven
Automation SaaS
Customers/Partners CO LO
Fully HUB
Internet/Cloud
Cloud-enabled

SERVICE ASSURANCE

AUTOMATION

Unified Access Security SECURITY


Unified
ABSTRACTION Access
Edge ANALYTICS
Core/
Distribution SD-WAN
Infrastructure
Network
Dedicated and Off the
Security
Shelf (OTS) Hardware
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
15

Stage 4: Automated Stage 1 2 3 4 5

IL
DETAIL
End-to-End Software Centric

A
ET
VIEW

D
Business
Digital Business X
Applications
Business Service
Requirements

POLICY

Service
Alignment
Dynamic
Cross-domain
Policy Alignment
Cloud
Clo ud

Policy-based
Cloud
Policy-based Service
Threat Detection, Assurance
Enforcement

Controller-based Clo ud

Integrated Automation
Analytics
Management
Controller-based
Policy-driven
Automation SaaS
Customers/Partners CO LO
Fully HUB
Internet/Cloud
Cloud-enabled

SERVICE ASSURANCE

AUTOMATION

Unified Access Security SECURITY


Unified
ABSTRACTION Access
Edge ANALYTICS
Core/
Distribution SD-WAN
Infrastructure
Network
Dedicated and Off the
Security
Shelf (OTS) Hardware
CAMPUS Edge D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
16

Stage 5: Self-Driving Stage 1 2 3 4 5

Closed-loop Automation

Business
Continuous automated
Digital Business
business-to-service alignment
Applications
Business Service
Requirements
P r i va te/P u bl i c Closed-loop automation
Cloud Service
POLICY Assurance
Fully virtualized
Service
Alignment Self-optimizing service assurance
Autonomic Policy
Compliance Analytics Automation Real-time agile IT operations

Self-protecting networking

Fully enabled for the cloud ecosystem


Security

Detail View >

Management
Controller-based
Closed-loop
Automation SaaS
Customers/Partners CO LO
Cloud-enabled HUB
Internet/Cloud

SERVICE ASSURANCE

AUTOMATION

SECURITY
Unified Access Secure Edge
ABSTRACTION Unified Access
FA and Core FA ANALYTICS
BR BR Secure
IC
Infrastructure IC
BA BA Edge
S Network S
Dedicated and Off the ED ED
Shelf (OTS) Hardware Secure Edge
CAMPUS D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
17

Stage 5: Self-Driving Stage 1 2 3 4 5

IL
DETAIL
Closed-loop Automation

A
ET
VIEW

D
Business
Digital Business
X
Applications
Business Service
Requirements Closed Loop
Policy-based
Automation
Service
POLICY Business Intelligence,
Assurance Cloud Providers,
Threat, Market,
Telecom Providers,
Environmental
Service & Other Data
Corporate Systems
Alignment
Autonomic Policy
Compliance across Analytics Automation
all domains Public / Private /
Cloud–based IT Services:
Hybrid Cloud
Analytics, Security, IoT
Applications

Security

Network Services
Cross-domain Service
(Virtual Network
Orchestration
Functions)

Management
Controller-based
Closed-loop
Automation SaaS
Customers/Partners CO LO
Cloud-enabled HUB
Internet/Cloud

SERVICE ASSURANCE

AUTOMATION

SECURITY
Unified Access Secure Edge
ABSTRACTION Unified Access
and Core ANALYTICS
Secure
Infrastructure Edge
Dedicated and Off the Network
Shelf (OTS) Hardware Secure Edge
CAMPUS D ATA C E N T E R BRANCH
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
18

Framework for Digital Network Readiness Model

Digital Network Readiness Model Categories


Improvements in capabilities are applied to each category
across all five stages of the model.

Network Architecture Automation Network-enabled Network-enabled Network Security


Strategy Service Assurance Analytics and Insight
Define the approaches to the network’s Adopt network automation capabilities Align Quality of Experience (QoE) with Use the network as a powerful platform Reduce risk and meet compliance
architecture, management strategy, to simplify operations and respond explicit and implied business intent. for business, IT, security, and OT insight. requirements by using the network’s
lifecycle management, governance, more quickly to new service requirements. Service assurance applies to all Improve operations, security and capability to reach all users and devices
and compliance at each stage of digital By increasing the level of automation in applications (productivity, mobile, cloud, business intelligence by delivering and gain visibility into all traffic to
network readiness. networks, IT can focus more effort collaboration, IoT, etc.), services valuable business, IT, OT and security- rapidly detect and respond to threats
on delivering value to the business. (business to business [B2B], business relevant data and by contextualizing and attacks. Network security provides
Automation allows IT to lower the cost to consumer [B2C], machine to machine who, where, when, what, how, and a robust and indispensable foundation
of operations while improving service [M2M], peer to peer [P2P], rich media, why devices, users and applications for an overall cybersecurity strategy.
levels and responding more quickly to operations, etc.), users, devices, and are using the network. With the advent of mobility and cloud,
new service requirements and locations. network security needs to extend from
deployments. the edge of the network through the
core and to the cloud.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
19

Readiness Model Stack


BUSINESS SERVICES The broad set of business functions and associated applications
that depend on the network, including functions associated with
customer experience, workforce experience, and business operations.

SERVICE ALIGNMENT The alignment between what the applications and the business
require from the network and the services that the network can
deliver. Service alignment is evolving from a best-effort manual
alignment to very tight closed-loop integration between business
requirements (for example IT operations, application service levels,
and security policy and compliance requirements) and the
underlying network.

MANAGEMENT The approach to managing network devices and network services,


including the level of adoption of open and extensible controller-
based policy-driven management and automation.

INFRASTRUCTURE The physical and virtualized network and network security components
of the enterprise network, including the campus, data center, WAN,
and branch networks.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
20

Business Outcomes
Improved results with each stage of the readiness journey

Improved Agility Lower Reduced Cost


and Faster Innovation Security Risk and Complexity
The increased pace of business requires The increased risk of security attacks The increased scale of networked
a network that is an accelerator for and breaches are the biggest drag applications, devices, and capabilities
change, not an obstacle. Fueled by a on digital transformation. Without an can lead to fast rising cost and
digital-ready infrastructure that can infrastructure capable of dealing with complexity if unchecked.
quickly respond to new business and emerging threats and attacks as they
application requirements and deliver happen, the business cannot move
valuable real-time insight. with digital speed.

Simplifies network
The Increasingly in step Provides a platform operations and uses
with the business and for proactively protecting resources efficiently,
Digital Ready an integral part of the the business, its data, freeing funds and resources
Network business strategy. and users. to enable business
innovation.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
21

Technology Attributes
Advance with each step of the readiness journey

Cloud Enabled Mobility Enabled IoT Enabled

Digitization requires increased scalability, agility, and Mobile devices and applications are basic enablers For many industries, digital transformation is fueled
openness, which demands new ways of running the of new ways of working, new ways of engaging by new IoT initiatives. From remote patient monitoring,
network. Shifting to a cloud-based approach (private, customers, new business processes, and completely to predictive maintenance, to asset tracking and
public, or hybrid) to deliver network services such as new business models. Therefore, a digital-ready more, IoT makes enhanced and totally new business
policy management, virtualized network functions, network must be built with mobility in mind and enable models possible. To support these new IoT connected
security, and analytics can increase the agility of a an enhanced mobile experience from anywhere on devices, applications, and processes, the network
network, while making it more scalable and open to any device. And of course, a digital-ready network needs to adopt new capabilities that can provide the
third-party innovations. At the same time, the network needs to protect the business from the increased risk service levels and security they demand.
architecture needs to be properly designed to optimize that comes with opening up networks and data to
secure user access to applications and services employee, customer, and guest devices.
hosted in the public, private, or hybrid cloud.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
22

The service levels required by an application or service need to be communicated


either through policies or directly by the applications, so that the requirements of

Business Service
users and processes are consistently met. Digital organizations need a network that
can deliver service levels aligned with explicit and implied business intent. Service

Requirements
Application assurance needs to be applied to all applications (productivity, mobile, cloud,
Service Levels
collaboration, IoT, etc.) and services (B2B, B2C, M2M, P2P, virtualized, rich media,
IoT, personal, etc.) across users, devices, and locations.
When an organization creates a new service or process,
embarks on a project to improve customer relationships, Policy applies to the organization’s security decisions about employee, partner, and
chooses a new security policy, is faced with a new regulation, visitor roles and responsibilities and about application, data, and network access
needs valuable real-time data, enters the world of IoT, etc., and use. Policies need to covers all network systems and data in the organization
the organization needs to help ensure that the network can as well as regulations defined by third-party governmental and trade organizations.
conform to these requirements and policies. Traditionally, this Traditionally, policies have been applied as fragmented network security mechanisms
assurance was achieved in a hit and miss, manual way, by IT Policy through manually managed access policies and enforcement mechanisms. In an
attempting to manually translate the policy requirements into and Compliance increasingly connected and mobile world with growing risk, digital organizations
network configurations. This approach inevitably slows down need ways to apply and enforce policies and achieve regulatory compliance in a
and can even derail these initiatives because so much intent real-time, dynamic and automated way.
and time can be lost in the translation. To overcome these
impediments, a digital-ready network needs to be able to
For IT to keep up with the rate of change and with the new demands of the digital
adapt to continuously understand the policies and needs of
network, it needs to make its operations more agile and responsive. IT needs to
the business and make the necessary changes on an ongoing
replace time-consuming manual and error-prone processes with ones that are
basis. Business service categories that can be policy-driven
simpler and more automated. IT needs to create operating models and technology
include applications service levels, policy and compliance
capabilities that allow much greater integration between business requirements and
IT
and IT operations.
Operations network services. Such capabilities include self-service service catalogs; day-zero,
day-one, and day-two operations automation; and IT workflows.
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
23

Resources
Use the following resources for more information and to help
guide you on your journey to digital network readiness.

Get an insider’s perspective on how to use View Infographic from IDC Research
the Digital Network Readiness Model

Cisco Digital Network Architecture


Digital Network Strategy and Analysis Services
Readiness Model

Learn more about the Cisco


Digital Network Architecture Explore the Cisco DNA Technical Whitepaper

Review the DNA Checklist

Getting to a Digital Network Architecture - Blog

Share
Digital Network Readiness Model Introduction Why? Readiness Model Framework Resources
24

DNA Checklist Questions to Ask Your Vendor

Can you support our digital business ambitions? How can your network technologies support our Security
digital requirements?
oo Do you have a vision and roadmap for networking that will oo Does your network provide security and protection for the
Architecture edge and the core?
support digital transformation?

oo Do you help customers achieve a smooth network evolution o o Is your network architecture end-to-end, meaning from oo Can your network act as a networkwide security sensor
to a software-delivered architecture? clients to cloud (access, core, WAN, branch office, data and intelligence dashboard?
center, cloud)? oo Can your network enforce contextual security policy and
o o Can your network architecture deliver lower cost and
complexity, reduced risk and enable faster innovation? oo Does your architecture enable end-to-end automation? respond to contain threats?

oo Can your network deliver valuable IT and business analytics? oo Is your architecture open and standards-based? Analytics
oo Can your partners and services ecosystem help me evolve oo Is your architecture designed to support a controller-based
to a digital-ready network? programmable network? oo Can your network provide clear visualization of activity,
networkwide?
oo Can you help with developing our network team’s skill set oo Is your architecture built to support virtualization?
to support a programmable network? oo Can your network identify threats and anomalies in real-time?
oo How does your architecture enable mobile, cloud, Big Data
oo Do you have a proven record as a trusted partner for the oo Can your network support distributed and cloud-based IoT
and IoT?
long term, to support IT through the journey to digital? analytics?

Automation oo Can your network provide valuable real-time insights into


oo Do you have a broadly adopted developers program?
customer and employee behaviors?
o o Can your management system create and configure
networkwide policy and services through standard APIs Service Assurance
and traditional interfaces?
oo Can your architecture apply application quality of service
oo Can your architecture automate policies across day zero,
(QoS) network wide?
day one and day 2 operations?
oo Can your architecture automate QoS policy across the network?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. Any third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Das könnte Ihnen auch gefallen