Wow ! The Application Centric Infrastructure (ACI) Launch was one of these amazing events which can only rejoice a social media leader like me .
13K+ registants for the webcast ! A Twitter storm (#ACI, #Insieme) Over 4000 mentions in a few hours ! A blog editorial plan including so far more than 10 Cisco blogs, 15 Technology partners blogs , and numerous articles from 3rd party, analysts and journalists -- A festival of videos, podcast, broadcast and infographics.
On the top of that I am pleased to welcome Cisco ACI a fast growing and independent LinkedIn group -- And I’d like to thank over 5500 professionals who already follow our brand new Cisco Data Center page on LinkedIn !
These series of facts show us how much interest our customers and partners find in this breakthrough vision and products announcement . So I figured out that a “little ” list of what’s available now will not hurt anybody !
This blog is designed to grow over the time thanks to your contribution -- So please feel free to post a comment with links (blogs, video, infographics , slideshare deck ) that I could have missed -- Or simply tell us what blog(s) or video(s) inspired you the most and why . And don’t hesitate to follow me @drombaut to make sure that I promote your suggestions:)
This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and the Caribbean came to discover innovative ways that networking technologies can help them reach new markets and understand which solutions are right for their specific challenges.
Security was a hot topic this year!
Customers were able to connect with numerous experts for guidance and advice on security IT challenges that their company may be facing. Maintaining an appropriate security posture in “Bring Your Own Device” (BOYD) environments can be a challenge. This year I delivered a presentation about BYOD Security and Cisco’s TrustSec in an 8 ½ hour session titled “Bring Your Own Device – Architectures, Design and Operation” (TECRST-2020). Implementing BYOD requires a comprehensive solution that ensures the security and reliability of the network while enhancing user experience and productivity. The exponential growth of consumer devices and the need to maintain continuous connectivity to corporate and Internet resources has brought new challenges to corporate networks. Network managers struggle to provide adequate connectivity to employees while protecting corporate data. This session focused on the architecture and framework required to deploy the proper network infrastructure, security components and device management to support different endpoints, each with unique permissions into the network. A combination of lectures and live demos provided the information needed for customers to build an effective BYOD solution. The latest Cisco Validated Design guide (CVD) 2.5 for BYOD was covered highlighting different BYOD use cases, including TrustSec, converged access and the integration with Mobile Device Managers (MDM) to receive device posture information. Read More »
Following our launch of the Cisco Application Centric Infrastructure (ACI), we continue with our series exploring in more detail key aspects of the ACI policy model and partner ecosystem. In Part 1 of my series on ACI, we looked at why application policies were an ideal model to build infrastructure automation around, and how application policies are better suited to mirror business objectives and requirements than traditional IT infrastructure policies. The key benefits for customers end up being vastly greater degrees of automation, process improvement and business agility.
In Part 2, we looked into one example of the difficulty in deploying and managing applications and the level of complexity that must be overcome to truly automate application-oriented tasks: application-specific network services and security policies (as well as a separate post on the partner ecosystem for application services and security solutions that support the ACI model).
When Cisco designed the concept of an Application Centric Infrastructure, we knew it wouldn’t reach its full potential without drawing in a very comprehensive ecosystem in a number of areas. Perhaps the most impressive aspect of our announcement was the breadth, quality and scope of the data center infrastructure vendors that we aligned so quickly with our ACI vision and that contributed their perspectives to the launch, and will be contributing key solutions to Cisco’s infrastructure-wide vision.
Yesterday, I blogged about the role of application controllers, network monitoring solutions, WAN optimization, firewalls, etc. have in setting up application networks, provisioning applications, and how the ACI policy model incorporates these security and services solutions. I wanted to follow up that post with some highlights from the support we received from some of our ACI ecosystem vendors in this area, that incorporate ACI policy support into their security, application delivery controller, load balancing and other solutions.
Every Friday, we’ll highlight the most important Cisco partner news and stories of the week, as well as point you to important, Cisco-related partner content you may have missed along the way. Here’s what you might have missed this week: