Professional Documents
Culture Documents
Cisco public
Automate your Solution: Cisco DNA • Policy-based onboarding • Reduced human error and provide greater
network Automation • Zero-touch provisioning uniformity
• Software image management • Quickly and simply onboard new devices
Product: Cisco DNA Center
• Process integrations with IT Service • Provide consistency for better network
Management (ITSM) and IP Address performance
Management (IPAM) • Streamlined operations
Assure network Solution: Cisco DNA • Streaming telemetry and contextual data • Enable complete visibility into all network
performance Assurance • Complex event processing with analytics devices
engines • Troubleshoot and find anomalies instantly
Product: Cisco DNA Center
• Correlated insights and contextual • Accurately pinpoint root cause
cognitive analytics • Provide single-click resolution and automation
• Guided remediation
Detect and Solution: Cisco DNA • Enforced policy and compliance • Simpler and more secure user access
mitigate threats Security • Multilayered machine learning • Detection of advanced persistent threats
Products: Cisco® Identity • Monitored streaming telemetry • Instant detection of zero-day malware
Services Engine (ISE) and • Encrypted Traffic Analytics • Identification of security threats in
Cisco Stealthwatch® • Network Security Analytics encrypted traffic
• Trustworthy systems
Provide Solution: Cisco SD-Access • Network and user segmentation • Ability to secure users, devices, and
consistent wired • Consistent management of wired and applications with identity-based policy,
Products: Cisco DNA
and wireless wireless network provisioning and policy regardless of location
Center and Cisco ISE
policy from the • Contextual data on users, devices, • Anytime, anywhere workforce
edge to the cloud and network • Reduced troubleshooting time and access to
• Network-to-IoT environments extended insights for decision making
through policy segmentation • Deliver consistent user experience, whether
• Branch and data center integrations for end- wired or wireless, and across domains
to-end policy management
Automate rollout Solution: Cisco SD-WAN • Tamper-proof chips that enable zero-trust • Minimize need for advanced technology
of your network with vManage authentication requirements
• Zero-touch provisioning for self-configuration • Reduce burden on IT or avoid advanced
• Templatized configurations technology requirements
• Centralized dashboard for monitoring the • Eliminate rogue devices, with zero trust
bring-up process authentication
• Help large enterprises roll out thousands of
sites in months
Assure network Solution: Cisco SD-WAN • Centralized monitoring and advanced analytics • Use a centralized dashboard for
performance with vManage and vAnalytics • What-if analysis for different application management
through visibility scenarios • Rapidly troubleshoot and correlate problems
and intelligence
• App QoE scoring for priority applications • Understand the context for underperforming
• Historic references for troubleshooting and apps, sites, and links
correlating app SLA with network issues
• Policy recommendations for more intelligent
handling of network traffic
Provide Solution: Cisco SD-WAN • Ability to define corporate and other • Isolate corporate infrastructure from
corporate Security with vManage segments business partners
security and • Definition of policies for mapping entities to • Protect connectivity during M&A and
compliance segments and for moving across segments divestitures
• Monitoring of networkwide traffic analytics • Segment lines of business, subsidiaries, etc.
within segments • Isolate guest wireless
Comply with Solution: Cisco SD-WAN • Redundancy that mitigates failure correlation • Efficient access and optimization for SaaS
application SLAs with vManage and Cloud • Centralized policies that specify SLAs for • Resiliency of critical apps during extreme
OnRamp critical apps failure scenarios
• Continuous monitoring of link telemetry • Central visibility of critical apps and failure
• Direct Internet Access (DIA) with real-time correlation
optimization for critical SaaS apps
Assure network Product: Cisco Network • Continuous analysis and verification of the • Assures network security policies and
availability Assurance Engine data center network against intent and policy checks for compliance against business rules
• Patented network verification technology to • Provides continuous verification, insights and
mathematically model and verify networks, visibility, and corrective actions.
and thousands of codified failure scenarios
that run right out of the box
Provide policy Solution: Data Center • Real-time awareness through streaming • Minimize operational and security risks
compliance and Analytics and Assurance telemetry for policy violations • Ensure fast and accurate policy compliance
enforcement • Application and network policies defined with auditing
Product: Cisco Tetration and
Cisco Network Assurance coarse and fine-grained segmentation
Engine • Historical playback of detected deviations in
network, servers, VMs, or remote sites
Enhance change Solution: Cisco Application • Policy-based automation for reduced human • Minimize risk of business-impacting outages
management Centric Infrastructure error and greater uniformity • Significant time reduction for IT operations
(Cisco ACI®) • Pre-change staging that predicts the impact • Accurate migrations
Product: Cisco Network of a change
• Assurance of change
Assurance Engine • Post-change verification to help assure
compliance with the desired state
• Simulated application behavior that predicts
incidents that affect service
Perform guided Solution: Cisco ACI • Continuous mathematical modeling alerts for • Faster mean time to detect and remediate
troubleshooting more than 5000 codified failure scenarios
Product: Cisco Tetration • Reduces number of low-quality IT help
and remediation • Intuitive user dashboard that logs human- desk tickets
readable smart events of failed checks
• AI recommendation engine that highlights the
exact problem and steps to fix it
Learn more For example, Cisco ACI and Cisco SD-Access policy integration maps Cisco ACI’s application-based
micro-segmentation in the data center with Cisco SD-Access’s user group-based segmentation
• Get started on your intent-based across the campus and branch. Now security administrators can automate and manage end-to-end
networking journey at cisco.com/go/ibn. segmentation seamlessly with uniform access policies – from the user to the application. With such
• Ask your sales representative for segmentation, policies can be set that allow IoT devices to access specific applications in the data
intent-based networking demos. center or allow only financial executives and auditors to access confidential data. This is just one
example of how Cisco solutions are enabling consistent multidomain policy segmentation and assurance
for end-to-end alignment to business intent.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other
countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective
owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C22-741901-01 05/19