This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and the Caribbean came to discover innovative ways that networking technologies can help them reach new markets and understand which solutions are right for their specific challenges.
Security was a hot topic this year!
Customers were able to connect with numerous experts for guidance and advice on security IT challenges that their company may be facing. Maintaining an appropriate security posture in “Bring Your Own Device” (BOYD) environments can be a challenge. This year I delivered a presentation about BYOD Security and Cisco’s TrustSec in an 8 ½ hour session titled “Bring Your Own Device – Architectures, Design and Operation” (TECRST-2020). Implementing BYOD requires a comprehensive solution that ensures the security and reliability of the network while enhancing user experience and productivity. The exponential growth of consumer devices and the need to maintain continuous connectivity to corporate and Internet resources has brought new challenges to corporate networks. Network managers struggle to provide adequate connectivity to employees while protecting corporate data. This session focused on the architecture and framework required to deploy the proper network infrastructure, security components and device management to support different endpoints, each with unique permissions into the network. A combination of lectures and live demos provided the information needed for customers to build an effective BYOD solution. The latest Cisco Validated Design guide (CVD) 2.5 for BYOD was covered highlighting different BYOD use cases, including TrustSec, converged access and the integration with Mobile Device Managers (MDM) to receive device posture information. Read More »
Following our launch of the Cisco Application Centric Infrastructure (ACI), we continue with our series exploring in more detail key aspects of the ACI policy model and partner ecosystem. In Part 1 of my series on ACI, we looked at why application policies were an ideal model to build infrastructure automation around, and how application policies are better suited to mirror business objectives and requirements than traditional IT infrastructure policies. The key benefits for customers end up being vastly greater degrees of automation, process improvement and business agility.
In Part 2, we looked into one example of the difficulty in deploying and managing applications and the level of complexity that must be overcome to truly automate application-oriented tasks: application-specific network services and security policies (as well as a separate post on the partner ecosystem for application services and security solutions that support the ACI model).
When Cisco designed the concept of an Application Centric Infrastructure, we knew it wouldn’t reach its full potential without drawing in a very comprehensive ecosystem of partners in a number of areas. Perhaps the most impressive aspect of our announcement was the breadth, quality and scope of the data center infrastructure partners that we aligned so quickly with our ACI vision and that contributed their perspectives to the launch, and will be contributing key solutions to Cisco’s infrastructure-wide vision.
Yesterday, I blogged about the role of application controllers, network monitoring solutions, WAN optimization, firewalls, etc. have in setting up application networks, provisioning applications, and how the ACI policy model incorporates these security and services solutions. I wanted to follow up that post with some highlights from the support we received from some of our ACI partners in this area, that incorporate ACI policy support into their security, application delivery controller, load balancing and other solutions.
Every Friday, we’ll highlight the most important Cisco partner news and stories of the week, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week:
Yesterday, Nov 6, Cisco unveiled details of the Application Centric Infrastructure with an ecosystem of partners that share our common view -- IT is in need of a transformation to create the Application Economy. Some key technology leaders spoke about the application lifecycle impact of an open and centralized policy model for complete infrastructure automation, including configuration, operation, monitoring, and optimization. I’d like to recap a few of those comments here today.
During the ACI announcement, Brad Anderson, Corporate Vice President in Microsoft’s Windows Server and System Center Group (WSSC), said that
virtualization has unshackled applications from the hardware in the past. But now with ACI we can do much more.So first of all, we can have the applications be able to describe their needs for more rapid provisioning. So with the view we can get across physical and virtual, we can see what is happening with the application, we can optimize the infrastructure for the application, and do more rapid troubleshooting.
…the integration with Microsoft cloud OS and UCS is really remarkable. Literally you have a common way to automate everything from the application, down to the operating system, down to all of the hardware level components. But ACI gives us the ability to do some really remarkable things..
Imagine how Exchange, Sharepoint and Linc -- being able to be shipped with ACI policies that now describe out how exactly the network should be configured, how it should be optimized, and automatically be provisioned across physical and virtual in a holistic way. That’s the kind of value we are going to be able to deliver together.
“…These new solutions are designed to improve business agility and reduce cost by driving infrastructure automation in support of core business processes and applications. This next-generation infrastructure will deliver increased application performance, resource pooling, visibility, automation and mobility through:
· Converged ACI stacks that include fully integrated versions of Windows Server 2012 R2 Hyper-V, System Center 2012 R2, SQL Server, Exchange and SharePoint”
I introduced the IT challenge posed by apps that behave differently in my earlier ACI post so now I want to point out that the new converged ACI stacks will fully integrate the operating system, orchestration, applications, server and network infrastructure to provide an enterprise customer with the application agility to rapidly deploy Exchange, SQL Server, and SharePoint, scale and upgrade them, and also to decommission them.
Many next generation distributed cloud applications are being written on open source platforms. For a view on what ACI means to a leading open source cloud platform, OpenStack, let me quote what Jim Whitehurst, President and CEO of Red Hat, said at the launch:
…there’s a whole set of functionality that is required to run a portfolio of true production applications and be able to run a diverse set of applications and to make sure that you can actually guarantee the performance levels that you need. The great thing about ACI is it provides that really differentiated functionality that enterprises need, even on open platforms, but at the same time, it does it with open standards, open APIs, and an open ecosystem so that customers get the benefit without being locked in and maintain the flexibility they are looking for going forward.
For more on Openstack and ACI, see this video – Application Policy and OpenStack – which explains how the DevOps community can extend agile processes to network infrastructure.