This sponsored guest is from Cisco Systems and was written by Mark Leary, a Cisco senior strategist and Chief Marketing Officer – Network Systems.
In my last blog, I outlined the three cornerstones of success for Borderless Networks – Workplace Transformation, Technology Leadership, and Operational Excellence. I also offered a detailed view into how Borderless Networks accelerates the transformation of the workplace by enabling the visual, mobile, and in-the-moment user experience.
Let’s now turn our attention to Technology Leadership within the network infrastructure itself. In this always-on ever-connected borderless world, leadership in networking is a critical success factor for all organizations. And no longer is the network judged as a tactical IT-serving utility. Now, it is judged even more critically as a strategic business resource.
Key questions to ask include… How does the network best deliver rich and consistent services? How does the network best protect connected resources and users? And finally, how does the network best adapt to new business demands and absorb new technology advancements? Let’s answer each of these three key questions now.
The Network Best Delivers via a Systems Approach.
The network is a critical business system, with many components required to work as one.
Extensible systems and integrated services combine to multiply the value of the Borderless Network. Cisco’s wide-ranging portfolio allows freedom of choice for the customer. Designed-in hardware assists and a wide range of network and service modules ensure that the network delivers not only rich services, but also provides consistent performance when services are turned on. The Cisco Integrated Services Router (ISR), with its extensive services capabilities, serves as a prime example here. Embedded hardware assists for voice, video, and security processing heighten ISR service capabilities and service quality.
Consistent services and common components also enable cost savings and operational efficiency. Cisco IOS provides a common software base across routing and switching systems. Common sparing and component reuse protects your investment as you expand and enhance your network. The Cisco ASR and ISR serve as good examples here. By design, the ASR makes use of SPAs already in use in customer networks. The recently announced ISR G2 makes use of network and service modules designed for the original Cisco ISR series.
The systems approach also delivers operational efficiency. Management expertise, policies, and practices can be applied across the network. Routine tasks and problem handling can be automated via such key features as Command Line Interface (CLI) scripts, Embedded Event Manager (EEM), and Generic On-Line Diagnostics (GOLD). Further consolidation and control is enabled through centralized management facilities such as CiscoWorks LAN Management System (LMS) and Cisco Wireless Control System (WCS).
Sun said it right in the 80s, “The network is the system.” We couldn’t agree more.
The Network Best Protects via Integrated Security.
Secure access to the network and networked resources is certainly a key area of concern for our customers. Security threats come from every direction – and are ever-changing. Protecting the network – no matter the angle of attack – is a must for every organization in this day and age. In many industries, it is even a regulatory requirement.
Given that threats appear in many forms and along many fronts, it is vital that security mechanisms provide blanket coverage for your network and networked resources. Do you lock all your doors when you leave for vacation? Or just some of them? Blanket coverage requires that security services be in operation across the network infrastructure at all appropriate points of potential attack.
And while these mechanisms must provide for maximum protection, they must also minimize their impact on network service levels. Protection should not sacrifice performance. And performance should not sacrifice protection. Here, Cisco’s systems approach outlined above bears fruit via integrated security services. Networking platforms that are optimized to run security services allow you to “turn on” security without driving down network service levels.
To further ease the impact of security across the network, central policies and consistent management interfaces allow the network operator to enforce security without having to commit to micro-managing security functions and secured users and resources. Here, the key is to balance effective security enforcement with efficient security administration. The goal: Provide full protection for your network and full productivity for your support staff.
Cisco TrustSec serves as a good example of an effective and efficient security service at work across the Borderless Network. TrustSec dynamically assigns access and services for users and devices and ensures that endpoint devices are authorized and healthy via consistent, network-wide security policy enforcement. TrustSec also helps address compliance requirements by providing access control to sensitive and valuable information and assets, collecting user activity and history data, as well as providing end-to-end monitoring and reporting capabilities.
Beyond TrustSec, Cisco further strengthens your security stance across many critical – and vulnerable — fronts. For example, Cisco AnyConnect extends access security to mobile users and their device of choice. The Cisco Virtual Office provides a complete teleworker solution, enabling full productivity and protection for the remote worker. Other security solutions target such key requirements as threat defense, data loss prevention, and PCI compliance.
When securing your network, it is also vital to remember that success is as much determined by solid processes as it is by strong products. Cisco’s unmatched portfolio of security support services run the gamut – from assessment to deployment to optimization to ongoing remote operations. In addition, Cisco also provides for proven secure network designs via Cisco’s Design Zone for Security, a wealth of security guidance and resources via Cisco Security Center, and rapid reaction to threats via PSIRT Advisories.
In this connected age, you must provide the most freedom and greatest flexibility for your users. While at the same time, you must exercise absolute control over connected resources – and all who wish to use and abuse these resources.
The Network Best Adapts via Continual Innovation.
In today’s world, continual network innovation is vital to achieving IT and business goals.
Cisco spends $5B+ in annual R&D on the network. Worldwide, 30 major labs and 20,000 engineers are dedicated to network technology and product development. We are a networking company. It is what we do. This focused and unmatched level of investment keeps us in front of not only our competitors, but more importantly, our customers looking to always do more with their network.
Evidence of this effort can be seen along two critical fronts – network standards and network service intelligence. Cisco has been at the forefront of driving the advancement and adoption of industry standards. Standards pioneered by Cisco read like a Who’s Who in networking technologies. Fast Ethernet, Power over Ethernet, SIP, CAPWAP, and MPLS… just to name a few. (See white paper.)
Cisco is also at the forefront of driving intelligent networks. Security, mobility, application networking, voice, video, network automation, and now even energy management all extend the capabilities and business impact of the network. These intelligent services are core to the Borderless Network Architecture. And they are core to the innovation that Cisco delivers to the network and to customers.
Witness the future unfolding within our IPv6 capabilities or our strong 802.11n portfolio. Witness the sustainability gains offered by Cisco EnergyWise and Cisco Virtual Office. Customers are saving money and promoting sustainable business practices by controlling their energy consumption and making the best use of their facilities. With Borderless Networks, everything is possible.
Is your organization leading or lagging in networking? Is your network ready for anything? Or afraid of everything? Does your network allow your organization to jump at or shrink from new opportunities? Let us know where your network stands.
I snuck over to the Interop NOC today and surreptitiously took some pictures of all the shiny monitoring tools on display, but it was all for naught. No, my camera wasn’t confiscated. Splunk, which provided the most interesting visualizations, went ahead and posted a live streaming video of NOC activity, embedded here:
So far, nothing too lurid or surprising, but maybe you’ll spot something.
When I spoke with Lenny Heymann, general manager of Interop, he was very conservative in predicting event turnout, saying Interop 2010 was “going to be a little smaller than last year’s” conference. Maybe he was just being modest, because once the crowds swelled in, the show was plenty busy.
Several analysts, journalists and attendees all told me that numbers seemed as high or higher than last year’s Interop (I didn’t attend), but press relations for the show said final numbers would not be available until after they closed up shop, sensibly enough. They would, however, part with one statistic: Paid conference attendance was up 30% over last year, which would (as best I can tell) put conference attendance at around 1,900 people. Keep in mind, conference attendance is a fraction of total attendance since a lot of people just browse the show floor or are exhibiting at the show themselves.
According to the EEIAC (an independent event attendance auditor), last year’s event saw a total of 1,478 conference attendees (not including who just visited the expo floor, which is free), which just over half the previous year’s attendance at 2,846 (Source PDF ).
Cisco’s been on an acquisition tear throughout most of the recession (See the complete list), but the seeds of today’s CleanAir announcement date back to 2006, when Cisco announced a partnership with a little known company called Cognio, which had only begun shipping their breed of Wi-Fi management software the spring before.
But that was just the start to what would turn into a beautiful friendship. The next year, Cisco was so happy with the results it announced it would go on to acquire Cognio, with Cisco’s Brett Galloway saying:
“Wireless spectrum is a strategic asset for our customers, and its management is key to the robust delivery of mobility applications,” Galloway said. “Cognio’s innovation in spectrum intelligence will help ensure Cisco continues to differentiate our ability to deliver our customers rich and dependable end-user mobility experiences.”
Yankee Group senior vice president Zeus Kerravala said that acquisition was part of the turning point for Cisco to move from “selling wireless stuff” to becoming a true mobility vendor.
As an aside, Brett Galloway was the Cisco executive who made today’s CleanAir announcement, too. While digging around, we also had a Cisco representative offer the following statement regarding what makes CleanAir better than standalone offerings, like Airmagnet or Cisco’s own Spectrum Expert:
While spectrum intelligence can be acquired in the form of tools like Spectrum Expert which are useful in the pre-deployment phase, the best solution is to have spectrum intelligence technology integrated directly with the infrastructure. The fully integrated Cisco CleanAir solution provides powerful features that are not available in Spectrum Expert such as 24/7 proactive monitoring of interference, spectrum security and performance alerts, remote management, and interference device location. And perhaps most importantly, integrated spectrum intelligence enables a new breed of RRM, which is able to understand and intelligently mitigate the impacts of interference.
There you have it: The long, relatively un-sordid backstory behind Cisco’s latest wireless defense mechanism. I’m meeting with Cisco again Thursday, so feel free to e-mail or tweet any unanswered questions you might have to me in the meantime.
In what may or may not have been a ploy to break the record for number of props used in an Interop keynote (a microwave, Bluetooth headset, mobile phone [those still exist?] and more all appeared), Cisco’s Brett D. Galloway (above, right) proudly announced the latest prong of Cisco’s Borderless Networks strategy: CleanAir technology (official release). CleanAir-embedded access points (APs) will connect with a WLAN dashboard to give networking professionals a quick overview of where their APs are deployed and, more importantly, what else is laying around in their offices, such as rogue Wi-Fi devices, unsecured wireless routers or even authorized devices that just happen to be knocking out an entire department from being able to sustain a reliable wireless connection to the wireless network.
In short, the new toolset is everything you need to be your own network toxic defender.
The visual dashboard can also overlay an office blueprint so that, for example, you can see who exactly decided it would be a good idea to install that X10 wireless camera to catch who was eating all the popcorn (Cisco’s example, not mine). The dashboard also shows a barometer that indicates, on a scale of 1 to 100, how relatively healthy your wireless network is, a nice feature for proving to your local pointy-haired boss that you’re doing your job.
The tool is also integrated with some smart technology that automatically helps your APs route around problem areas to reduce interference, and since the technology is on a seperate chip, Cisco claims it won’t degrade overall network performance.
Wireless mapping tools are nothing new (Airmagnet is one, for example), but anything officially built into the Cisco fold has a strong market advantage, and it looks like the engineering team there has done a lot of work to make the process as intuitive and friendly as possible.
But really, did they need the bright red barometer?
Kevin Kennedy, Avaya’s president and CEO, said IP was able to consolidate or supersede dozens of other protocols like PUP and RIP and that the time was soon coming for SIP to take the same route, but a layer higher. Avaya was pushing SIP as the protocol of choice for voice, video, Instant Messaging and other types of communication, and Kennedy gave six core reasons why SIP was the right rule to ring them all:
1) Infrastructure and Dial Plan Consolidation
2) Applications Control Network Delivery
3) Multi Modal
4) Session Level Granularity
5) Comprehends Communications as a Conference
6) Directory Confederation Enabled
And while I certainly believe consolidation, standardization and interoperability are beautiful things, Avaya has an uphill battle, at least in the short term. SIP has been over-promised for years and years, while even full SIP compliance doesn’t guarantee the communications interoperability and unification Kennedy gushed about.
Still, it’s a beautiful dream and Avaya has big enough guns that it’s entirely possible, particularly as enterprises look to speed up deployments while reducing complexity.
Curt Franklin has a good write up on the rest of Kennedy’s Interop keynote if you’re interested in what you missed or want another perspective.
With a few exceptions, conferences are growing smaller: Travel budgets are slashed, work loads are up, and companies are trying to “go green,” with or without a pricey Cisco telepresence get up (although I secretly think that last is still less about Mother Earth and more about Father Dollar). Interop is no exception, a fact Lenny Heymann, general manager of Interop, addressed head on when I asked him about it, admitting the “event is going to be a little smaller than last years’,” which itself was a smaller event.
But he said that, in a way, that’s OK. “We’re tracking really well in terms of the key vendors,” he said. “The people who still come are the ones … who are going to be buying things, the ones who want to get something done.”
Show attendees I spoke with yesterday echoed Heymann’s sentiment: This year’s Interop isn’t about ogling booth babes while getting your booklet stamped to win a Wii; it’s shaping up to be a more focused, get-what-you-need show where attendees are coming to learn, to meet potential partners, and to get things done.
“It used to be companies just sent people because everybody sent people,” an attendee told me yesterday as we were registering. “Now, you really have to justify it, but a lot of people are still coming, and they’re coming with a clear agenda.”
Maybe it was the equivalent of having a heart attack at a cardiology trade show, but a number of Interop’s early bird registrants found themselves on the receiving end of an IT snafu: Attendees were told to “Wait just 10 more minutes” as they were left to stare at an endlessly looping registration screen.
One bemused attendee quipped, “Is there an IT guy in the house?” 10 minutes later, there was still no sign of advancement as the self-service terminals, and the line continued to grow.
Eventually the aforementioned smart aleck begged off: He was on duty in a exhibitor support role to quietly show off his wares, and he had meetings to attend. Things proceeded relatively smoothly thereafter, with at least one more outage but few vocal complaints. Early birds might get the worms, but they also get the bugs, too.
Now that everyone has checked in (well, almost everyone) and is finishing up on their conference preparation, it’s about time you started finishing up that itinerary. You can read about what Interop General Manager Lenny Heymann said regarding this year’s hot topics (virtualization, cloud computing and networking fundamentals) but if you’d like an outside perspective, the SearchNetworking staff did some great preview interviews (all available on their Interop Las Vegas landing page) and came away with 6 clear-cut recommended sessions, straight from the organizers themselves. You’ll have your itinerary done in no time.
Doug Washburn on the Data Center
Sue Fogarty, SearchNetworking’s editorial director, spoke with Doug Washburn, Forrester Research analyst and chair of Interop’s Data Center track.
Washburn’s top recommended sessions about the data center include:
- “Bridging the C-suite gap: How to build the business case for data center transformation”
- “Planning for server, storage and network convergence”
- “How data center managers should evaluate the cloud and cloud-like efficiencies”
Jim Metzler on the Networking Track
- “Why Networking Must Fundamentally Change”
- “Breakthrough Network Technologies”
- “Advances in Network Management”
Sure, technically Interop Las Vegas 2010 started yesterday, but it really kicks off in full today, with the keynotes beginning tomorrow. Whether you’re trekking into the Las Vegas sands or following from afar, the IT Watch Blog brings you the Interop experience, minus the hangover, starting with our exclusive interview with Interop Las Vegas 2010 General Manager Lenny Heymann.
And Heymann had some surprising things to say: That the networking market has been dull, that virtual events aren’t eating away at live conferences and that early indicators are showing desktop virtualization might get very hot, very soon.
But perhaps the most surprising thing Heymann told me? He’s been helming Interop for so long, he doesn’t know how many he’s run anymore
“I joined the company that produces Interop [TechWeb] in 1997,” he said. “And somewhere in the early 2000s I took over as GM.” When pressed to be more specific than that, however, Heymann’s memory failed him.
It’s a forgivable lapse since Interop, which has grown to become one of the most influential IT conferences, has found itself changing to keep its top dog status.
“Going back to the early days, Interop was created to help foster, literally, interoperability in the networking area,” he said. “As we grew and networking grew in importance, we took on a lot more of the IT and business technology story. Currently we cover the whole gamut of business technology that IT professionals need.”
So what are the hot topics at Interop 2010?
Cloud Computing: “There’s so much attention and valid interest [in cloud computing], and it’s not just an outsourcing problem,” said Heymann. “There’s networking and security issues and it goes on and on. … Cloud is now number one with a bullet in terms of people wanting to know more information.”
Virtualization: Just behind cloud computing, and closely related to it, is an avid interest in virtualization: Server virtualization, network virtualization, and even desktop virtualization, which is just now beginning to appear on many IT departments’ radar screens.
Sunday and Monday are both seeing dedicated virtualization tracks and sessions. Surprisingly, Heymann said that this year saw a spike in desktop virtualization, with 33% of respondents in a pre-Interop poll indicating they were investigating deploying the technology.
Networking: Although Interop was created as a deep technology networking conference, Heymann admitted that the focus had often shifted to other, “hotter” technologies over the years.
“The last few years in networking have been a little bit slow: The market has been slow overall, but one thing we’re looking forward to this both from the conference and exhibitors is more excitement, in terms of how vendors are going to deal with virtualization and cloud computing,” he said. “The other thing that’s going to add energy to the networking world is a whole lot of mergers that have taken place over the past year.”
3Com and HP, Avaya and Nortel, Cisco and countless assimilated pieces. Heynmann said that with all the shake ups, Interop is the one place end users can come and hear the whole story straight from the horse’s mouth.
Whether you’re trekking out into the Las Vegas sands or watching safely from your home base, IT Knowledge Exchange has you covered: The Enterprise IT Watch Blog is teaming up with SearchNetworking.com to bring you the most comprehensive Interop coverage. Follow Interop coverage on the IT Watch Blog or check out SearchNetworking’s coverage on the Network Hub. If you’re in Las Vegas yourself, shoot me an e-mail at Michael@ITKnowledgeExchange.com: I’d love to hear what you’ve learned, seen or heard, and we have plenty of free swag to give away to IT Knowledge Exchange members!