View More
View Less
System Message
An unknown error has occurred and your request could not be completed. Please contact support.
Wait Listed
Personal Calendar
Conference Event
There aren't any available sessions at this time.
Conflict Found
This session is already scheduled at another time. Would you like to...
Please enter a maximum of {0} characters.
{0} remaining of {1} character maximum.
Please enter a maximum of {0} words.
{0} remaining of {1} word maximum.
must be 50 characters or less.
must be 40 characters or less.
Session Summary
On-demand Library
Cisco Live Session Videos and Presentations Listing
Online Events
Upcoming Cisco Live events
Social Networking
Connect with Cisco Live
Solutions Center
Cisco Live Conference Exhibitors
Cisco Live Survey
In-person Events
Cisco Live Milan 2014
Event Details
Social Media
Cisco Live Melbourne 2014
Cisco Live San Francisco 2014
Event Details
Scheduler (Live Jan 13)
Social Media
Cisco Live Cancun
Log in to access thousands of sessions on cloud, BYOD, data center, and more!
Join now to access free content from global Cisco Live conferences.
Add to My Interests
Add to My File Queue
Remove From My Interests
Remove from my File Queue
Incomplete Account Information
You have not yet completed your account information. Would you like to do so now?
Edit Account Now
You already have an account in the system. Please click here to login

If you don't remember your username and password, please use the forgot password utility.
  File Download Queue
Search Catalog

UCS-4792 - UCS Security Engineering Overview (2012 San Diego) We will outline key security features and best practices for UCS. This is a session broken into two key areas between the UCS control plane (processes, open ports, organizational boundaries, access methods, etc.) and the UCS data plane (VLAN groups, FEX isolation, DisJoint L2 operations, VM-FEX for isolation to the VM, etc.) and finish up with certification status.
ATE-CL326 - Architecting a Modern Approach to Real Time Business with Vblock Specialized System for SAP HANA (2013 Orlando) Learn how VCE’s new Specialized System is enabling customers to get SAP HANA software up and running in production more smoothly, quickly, and reliably in order to capitalize on the benefits of real-time insights to help address fleeting business opportunities faster.Takeaways: * Identifying transformational opportunities * Planning an SAP HANA installation * Advantages of Vblock Specialized System For More Information Visit the VCE virtual resource center to get additional information, download product and solution material, and more.
GENSSN-1616 - Super Session – Intelligent Cybersecurity for the Real World (2014 Melbourne) Driven by market trends in cloud, mobile and the Internet of Everything, technological change is accelerating at lightning speed with the network at the core. Security is no different. Attackers are innovating faster than the industry, finding new attack vectors to exploit their targets and creating significant new security challenges. Join Christopher Young for a discussion on how these phenomena have driven defenders to challenge today’s security assumptions and how Cisco’s new security model and offerings can address our customers’ biggest security problems.
GENKEY-1627 - Cisco Live Melbourne Opening Keynote (2014 Melbourne) Join visionary speaker Wim Elfrink for the opening keynote address and learn about the impact of IoE.
CP-1006 - Network Models and the Network Architect One of the very first things any aspiring network engineer learns is the OSI seven layer model -- but once it's learned, it's often left in the background, another trivia item that doesn't seem to be much use in the real world. Leaving models in the background is, however, a mistake; these are some of the most useful tools the network engineer has to classify and understand protocols and network operation. This session will discuss the history behind the popular seven layer model, and then move into some other models network engineers might find useful, including some you may never have seen before. Cisco Press book: The Art of Network Architecture: Business-Driven Design by Russ White and Denise Donohue
ATE-CL346 - Build Your Own Innovative Support Applications leveraging Cisco Support APIs (2014 San Francisco) How are APIs delivering both a competitive and support edge to a growing number of companies and IT professionals? A recent survey by Venture Beat found that more than 85% of large companies will have API programs in the next 5 years. Join Alok Patel and colleagues from the Cisco Smart Web Technology Group to explore how – 1. The market landscape of APIs for Enterprise Customers and Channel Partners is changing 2. APIs enable you to pull vital Cisco support data into your own systems on demand 3. Companies are using APIs to unlock business innovation and boost their bottom lines This session covers the “what,” “why” and “how” of Cisco APIs now available to you. We will spotlight lessons learned, best practices, and exemplary API strategies adopted by Cisco partners and customers.This session also features live demonstrations of Cisco Support APIs, and illustrates how companies are using APIs today to both innovate support solutions and advance business priorities. For More Information Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL327 - Security Defined Networks: Deploying Security Defined Networks in the Real World (2013 Orlando) Today’s advanced network security threats are growing in complexity, scale and scope. Highly co-ordinated resources and activities are being leveraged to assault today’s networks with unprecedented speed and agility—a new paradigm in network security monitoring is required in order for organizations to adapt and respond to these threats. In this presentation, Net Optics VP of Technology & Solutions Sharon Besser defines the next generation approach to security utilizing security-centric SDN, and provides concrete steps organizations must take with their network security and monitoring. For More Information Visit the Net Optics virtual resource center to get additional information, download product and solution material, and more.
CIN-WS205 - Activate—Identity Services Engine 1.2 Learn about the Cisco Identity Services Engine and the new enhancements available with its most recent release—ISE 1.2. The Identity Services Engine provides a comprehensive, all-in-one solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. During this online event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors. Join Cisco experts Sanjay Raja and David D’Aprile for a closer look at ISE 1.2, and all the advantages it can bring your business.
ATE-CL400 - Deploying and Managing the Unified Access One Network (2013 London) Enable IT organizations to effectively adopt, integrate and operate the unified access infrastructure with Cisco Prime Infrastructure. Visit the Cisco Prime virtual resource center to get additional information, download product and solution material, and more.
ATE-CL408 - Cisco Unified Fabric: Delivering Architectural Flexibility (2013 London) The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the  “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments. What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed. Visit the Cisco Switching virtual resource center to get additional information, download product and solution material, and more.
UCS-4797 - Cisco Intelligent Automation for Cloud (UCS) (2012 San Diego) Cisco Intelligent Automation for Cloud is a self-service provisioning and orchestration software solution for cloud computing and data center automation. This session will provide a detailed product overview, followed by an instructor led demonstration of the software suite. We will build off the UCS Manager capabilities describing how this solution automates key data center functions and actions.
ATE-CL338 - Scale your Network Security and Monitoring infrastructure to Keep up with Advanced Targeted Attacks and Big Data Flows (2014 San Francisco) Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks. Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses: 1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture 2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach 3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility 4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples) 5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
ATE-CL336 - End-to-end management of NetApp FlexPod integrated infrastructure with Cisco UCS Director (2014 San Francisco) Customers are faced with difficult decisions about how to deploy and manage IT. FlexPod allows customers to deploy best in class technologies, pre-validated to reduce time to deployment and operational complexity. Cisco UCS Director gives you a single application to monitor, plan, and execute infrastructure management tasks. For More Information Visit the NetApp Solutions Center to get additional information, download product and solution material, and more.
BRKPCS-2059 - ACI Impact on Physical Infrastructure Design and Deployment (2014 San Francisco) Adoption of Cisco’s new Application Centric Infrastructure (ACI) will require some changes to the way data center physical infrastructures are designed and deployed. Depending on the scalability, performance, and applications requirements, customers will need to determine the best physical infrastructure to accommodate a variety of spine/leaf network topologies options including ToR, EoR, and MoR leaf switches. In this session, Panduit examines the physical implementation requirements of an ACI deployment including how to design ToR, EoR and MoR network architectures for ACI, and strategies to simplify the deployment of this next generation architecture in order to help customers accelerate their path to ACI.In addition an overview of available services and product sets that help customers manage risk within the physical infrastructure by intelligently converging physical and logical systems to simplify the deployment will be presented.
GENKEY-1626 - Decoding Connectivity: Leading & Thriving in an “Internet of Everything” World The benefits of connectivity have already changed our world and this is only the beginning. Carlos Dominguez, Senior Vice President of Cisco, brings the Internet of Everything to life in his fascinating keynote during Cisco Live 2013 Melbourne. Learn about what's coming and find your place in this exciting new world. Discover: • What is the Internet of Everything? • How will it influence and change business – today and in the future? • What is the personal impact each of us will experience?  
BRKPCS-2056 - See. Point. Click. Fix. Simplify Your Network with LiveAction (2014 San Francisco) Networks can be complex and difficult to manage, but with LiveAction they don’t have to be. In this session, you will learn how LiveAction simplifies network management. LiveAction is a network performance management tool with deep, rich visualization capabilities, QoS control, analytics, and automation. Attend this session to see how LiveAction can help you get the most ROI from  your Cisco products and why it is available through the Cisco Global Price List.  See. Point. Click. Fix.
BRKPCS-2058 - Forensically Uncovering Cyber Threats By Monitoring Behaviors (2014 San Francisco) Learn how Security Operation Centers are uncovering internal hosts communicating with botnets, machines participating in DDoS attacks and end systems performing unwanted data exfiltration.  Since signature matching is ineffective at detecting many forms of malware, participants will learn how to leverage NetFlow and IPFIX to baseline behaviors and bring visibility to the active threats on the internal network. This session explains how to gain threat landscape clarity and how to avoid a sea of false positives.  Learn best practices for leveraging Cisco ISE and Cisco AVC exports to provide richer contextual details surrounding a contagion.
BRKPCS-2053 - How the cheetah catches dinner: The importance of agility in a world defined by speed (2014 San Francisco) The cheetah teaches us the value of agility—the ability to rapidly change direction without losing speed. On the savanna and in today's business environment, agility is more important than ever. Being first and staying ahead of the competition requires agile business processes. VCE will describe how customers will be able to use VCE Vblock™ Systems and the powerful network abstractions provided by Cisco ACI to enhance IT agility and accelerate business growth.
BRKSPG-2619 - Cisco Evolved Programmable Networks (2016 Melbourne) As competition in Carrier services market intensifies Service providers are challenged to make services more agile, simplify networks and reduce operational costs while growing the capacity.  Cisco Evolved Programmable Network (EPN) provides an open programmable network architecture covering both physical and virtual network resources. In EPN architecture SDN controllers and consecutively applications are able to orchestrate network resources and facilitate network telemetry analytics in real time to optimise operations, ensure high availability & avoid brownouts. Open APIs used in the Architecture bring the full automation and on-demand programmability to enable flexible resource & service allocation.  The session will provide an overview of use cases/applications to leverage EPN in Internet Infrastructure, Carrier Ethernet & Mobile Backhaul layers. It will also review a set of Open APIs available on Carrier routing platforms and guide on relevant SDN controllers/orchestration middleware to build flexible automated network. Lastly the session will include demonstration of the Opendaylight (ODL)-based application which is using the EPN.
BRKSEC-2693 - ELK for Enterprise IR Visibility (2016 Melbourne) Cyber Security presents an ever changing and increasing challenge to individuals, corporations and nation states. It is no longer a case of "If' or "whether" an organisation will be subjected to a cyber attack of one kind or another. Today's reality is that it has probably already occurred. Cisco uses the concept of an "Attack Continuum" to highlight that if an organisation is to respond effectively to this reality, it needs to be prepared in advance and know what to do Before, During, and After an attack.
PCSZEN-1022 - Reinventing applications FOR REAL - how the co-evolution of hardware and software make it possible The last few decades have brought about a dramatic transformation in both hardware and software development. Changes to one drive changes to the other, all with the aim of moving away from monolithic applications deployed on huge custom machines to agile, infinitely scalable services deployed on high-performance, cost-effective, software-defined networks and infrastructure. This talk will share some of the history that has led to this point, and offer insights on how these new systems can help you shape your own IT evolution from traditional data center virtualization to hybrid cloud models, microservices architectures and beyond.
PSOSEC-2003 - Key Security Measures to Enable Next-generation Data Center Transformation (2015 San Diego) Part of the tension between IT and security has been the all-too-often correct perception that security interrupts and slows down business-critical applications and services. Nowhere is this more apparent than in the data center, where complex traffic, customized applications, virtualization, and dynamic resource scalability are essential to the health and success of the organization. In this presentation we will look at Cisco's next-gen ACI data center solution from a security perspective. This session will focus on key ACI security measures that executives and data center teams need to understand when considering data center innovation and to move the business forward quickly. 1. Unmatched Agility that enables dynamic security provisioning designed for next-gen data center environments. 2. Integrated Protection that leverages native ACI security combined with ASA NGFW and FirePOWER NGIPS. 3. Dynamic Control that provides transparency, forensics and remediation through Cisco AMP, PCI compliance, and the ability to dynamically audi change
PSOGEN-1105 - Develop Mobile Apps and Interactive Displays with Cisco Connected Experience (2015 San Diego) Delivering engaging mobile and interactive experiences in the world of IoE requires more than a good user interface. It requires aggregation and delivery of the right information, the right capabilities, at the right time, on any device at the point of use. It requires bringing together network information, collaboration capabilities, business applications, and data that is relevant to the user to enable context-aware, personalized, and productive interactions. Cisco Connected Experiences software helps developers deliver rich personalized information to engage people in context. Join this session to learn how we are combining the best technologies from Cisco and our partners to provide powerful mobile and interactive display platforms that help you to address the increasing expectations of your end users.
BRKSPG-2116 - Advances in IP+Optical (2015 San Diego) As Service providers around the world look at expanding their core networks, we will re-examine the advances in IP+Optical integration and architecture. We will review optical consideration factors for IP+Optical design, including G.709, optical impairments, and modulation schemes, including the modulation scheme for coherent 100G. We will cover IP+Optical architectures that include placement of high speed optics in the router or an optical shelf as well as management of IP+Optical networks. New trends in ROADM functionality are discussed that enable a more seamless integration with core routers that includes omnidirectional, contentionless add/drop and flex spectrum. We will conclude with current and future use of multi-layer control plane in converged optical and routing networks along with coordinated protection schemes.
PSODCT-2171 - Cisco and Microsoft Hybrid Cloud Solutions (2015 San Diego) **The video for this session is unavailable.** The session will feature how Cisco and Microsoft are delivering together, Service Provider and Enterprise based Cloud Platforms from the perspective of the consultants who deliver them. The architecture will show the additional features, supporting Service Provider model, and ultimately support additional cloud platforms in addition to Microsoft. Initial target customers are large enterprise, Service Provider and government, with subsequent releases to support additional products, and a broader market. This presentation introduces an architecture for a platform to support System Center, Windows Server 2012 R2, Windows Azure Pack in concert with Cisco Hardware and Software solutions. Deployments include the use of the Microsoft Service Provider Reference Architecture (SPRA), and Cisco Validated Design for Microsoft FastTrack v4, which have a proven capability and scale to support a large number of multi-tenant enterprise and service provider workloads./p>
PSODCT-2001 - Scalable Data Center Networks with Nexus 2K, 5K, 7K Product Architectures (2015 San Diego) **The video for this session is unavailable.** Cisco leads the way in Data Center architectures and has a wide range of DC deployments using the Nexus 2K, 5K and 7K product architectures. The Nexus product line addresses the varied requirements of Data Centers across varied market segments and geographies. The Nexus 2K, 5K and 7K portfolio consists of multiple flavors with leading technologies (including overlay, virtualization and cloud), fabric architectures, ease of deployment and management with solutions like FEX. The product lines being presented in this session continue to be the most deployed DC products in the industry and are evolving into multiple new products to meet the growing needs of modern Data Centers, to inter-work with current architectures and have the ability to meet future demands.
BRKIPM-1261 - Introduction to IP Multicast (2015 San Diego) This session is an overview of the fundamentals of IP Multicast, with some history and background on the development of IP Multicast. It covers the basics of IP Multicast components such as addressing at Layers 2 and 3, host-router signaling (IGMP v1-v3), distribution trees, and Reverse Path Forwarding. The session provides an overview of Protocol Independent Multicast-Sparse Mode (PIM-SM) and its various modes of operation. Bidirectional PIM, Source Specific Multicast, the concepts of several interdomain multicast protocols such as Multiprotocol Border Gateway Protocol (MBGP) and Multicast Source Discovery Protocol (MSDP), Automatic Multicast Tunnels (AMT) are briefly introduced. Also included is a brief overview of IPv6 Multicast. This session is for network engineers who have no previous background in IP Multicast.
GENSSN-1625 - Data Centre Technology Super Session (2015 Melbourne) Are Applications Driving Your Business Outcomes? Let ACI Automate Your Infrastructure Applications run our business, simplify processes, and help make our lives easier. Wouldn’t it be nice to have an infrastructure that kept pace, allowing you to focus on your business outcomes? With ACI as your foundation, you can create a cloud environment that quickly builds, operates and scales. Learn and understand current technology trends that continue to guide ACI development now and far into the future. Learn how ACI drives IT automation through the creation of an agile infrastructure. Hear directly from customers about their journey to date and where they want to go. And find out how truly open ACI is from operational choice to open APIs from customers, partners and developers. The future of networking is available today, allowing you to create your own map of endless possibilities.
BRKNEG-1209 - AXTEL (2015 Cancun) Esta charla pretende mostrar los aspectos normativos y de cumplimiento que rodean a las soluciones de Infraestructura como Servicio (IaaS) y Escritorio como Servicio (DaaS) mediante una base de soluciones de seguridad (SECaaS) la cuál cuenta con una serie de controles técnicos y administrativos para mantener altos estándares en temas de seguridad y protección de datos.   Tocando los siguientes puntos relevantes: Infraestructura homologada por fabricantes Procesos alineados con estándares Auditorías persistentes Investigación constante Certificaciones internacionales
BRKCOL-2380 - Designing a Cisco Unified Communications Solution to be Accessible for People with Disabilities (2015 San Diego) This technical breakout session will cover the Cisco Unified Communications (UC) features that enable a UC customer to accommodate the needs of their employees and customers with disabilities. Cisco Accessibility team will be presenting practical design solutions and provide a Q&A. * Live demonstration of UC accessibility features * What third-party add-on products can enhance the accessibility of Cisco UC.
BRKSPV-1261 - Designing an Online Video Service (2014 Milan) Streaming Video has been around for many years but with the advent of tablets & high speed broadband it has come into its own. This workshop will focus on the new wave of video delivery technologies used in “Over-the-Top” environments & explore the best practice designs used when building such a streaming video service. The session will start by looking at what we are setting out to achieve, and methodically set out the system architecture and each of the various elements that will contribute to the solution, and conclude with a typical example use case.
BSAARC-1011 - Borderless Networks (2013 Orlando) This session reviews the Borderless Network Architecture in depth. With the explosion of devices, video, cloud, BYOD, and other market trends, the capabilities that Borderless Networks provides brings tremendous value to the enterprise. This session will review the main architecture pillars and the requisite services provided by the Borderless Network: Cloud Intelligent Network SecureX Unified Access Connected Industries
BRKPCS-2028 - Unified, Flexible and Affordable Network Management (2013 Orlando) Network management technology should be designed to make managing IT environments and delivering services to users less complicated – without sacrificing adaptability or draining budgets. In this session, a solutions expert from Ipswitch (WhatsUp Gold)  will share proven best practices to help you simplify IT operations by unifying network management, log management, and application performance monitoring with a solution that makes both your tasks and your network easier to manage. Our experts will dig deep into systems, networks, services, applications – and those who rely upon them to do their jobs – to uncover common challenges and considerations when addressing a comprehensive approach to IT management. In tandem, you’ll hear from a peer (aka, one of our customers) who will share real-world experiences and tangible results that will help you further identify how our solutions can provide tangible benefits to your network environment.
PNLRST-4006 - Get More from Your Network with an Intelligent WAN (2014 Milan) Today’s WAN environments face growing pressure with the adoption of cloud, mobility and rich media applications. Yet, three out of four organizations report no growth in WAN budget. Many organizations are expected to deploy new services like BYOD, guest access, software-as-a-service, and need to determine how to meet the demands of the business without additional resources. In this session, you will learn how to improve WAN performance, reliability and security while lowering costs and simplifying operations. You’ll hear real-world examples how others like you are leveraging the services of Cisco IWAN to deploy consistent security across a hybrid WAN, increasing their WAN utilization with up to five-nines reliability, and improving user experience with business continuity. Join our expert panel of customers from Qualcomm, Genworth and SFR, and learn how Cisco Intelligent WAN (IWAN) can help you more efficiently utilize your WAN to meet your business requirements, quickly pay for an infrastructure upgrade and free up IT resources for strategic projects. 
BRKGS-2526 - Driving UC Adoption across all platforms, mobile, desktop and meeting room. (2014 Milan)  Despite data suggesting increased investment and deployment, the past decade has seen much lower true adoption of Unified Communications (UC) than expected.  This is in part due to end-user barriers, including difficulty installing and using devices, as well as a lack of true understanding of the benefits of UC.  This partner session will tackle these challenges and help businesses move to higher adoption rates and more productive use of the Cisco Collobration tools in which they have already invested.  This presentation will include both hardware and software elements, as well as best practices for driving adoption at the end user level. Please note that the session length is 20 minutes.
BRKDCT-2255 - Cisco's Cloud Ready Infastructure - VMDC (2014 Milan) Cisco Virtualized Multi-tenant Data Center solution (VMDC) is an architectural approach to IT which delivers a Cloud Ready Infrastructure. The architecture encompasses multiple systems and functions defining a standard framework for an IT organization. Standardization allows the organization to achieve operational efficiencies, reduce risk and achieve cost reductions while offering a consistent platform for business. This session will address the physical and logical construction of Cisco's VMDC system which provides a validated approach to both enterprise and service provider cloud deployments. Particular attention will be paid to the controlled consumption of cloud resources and isolation of workloads on a shared infrastructure consisting of the Cisco Nexus 7000, 5000 and UCS platforms. In addition, enhanced security providing isolation, visibility, access controls and policy enforcement using Cisco's ASA technologies, Virtual Security Gateway, and Prime NAM will be detailed.
BRKSEC-3770 - Advanced Email Security with ESA (2013 Orlando) This technical session will tackle several advanced topics of e-mail security with a focus on Cisco's solution. We shall begin by describing the level of IPv6 support in newer versions of AsyncOS, and what changes this brings to traditional e-mail processing. Second part of the session will talk about recent trends of migrating towards the Cloud or Hybrid Cloud e-mail security solution, and what are the challenges and migration consideration. This will be followed by a section on Message Filters, a powerful mechanism of mail flow filtering which was deliberately neglected out of caution. Several Anti-phishing techniques will be laid out in the remainder of the session, outlining Cisco's Outbreak Filters, and providing insight into DKIM and SPF deployment considerations. Prerequisites for this session are acquaintance with SMTP and e-mail security technologies; experience with Cisco E-mail Security products is desirable. The target audience are security and email administrators of the enterprise email gateway. The audience will also benefit from following the session BRKSEC-3771 ';Advanced Web Security Deployment with WSA'; and BRKSEC-2695 ';Embrace Cloud Web Security with your Cisco Network';
BRKPCS-2015 - Cloud Case Study: How Verizon's Cisco Powered services enable Warner Brothers in the cloud (2013 Orlando) Many businesses and organizations evaluating cloud technology are concerned about how they can migrate from existing premise-based infrastructure to hybrid architectures comprised of premise-, managed-, and cloud-based services. This session will describe how one of Verizon�s customers has successfully completed the transition to cloud and how they implemented a solution that aligns with their business needs and scale. You will learn best practices for evaluating various cloud services, including how to verify that services will provide the performance and reliability you have come to expect from your own enterprise network, how to accelerate return on investment, and how to be able to leverage ongoing innovation in cloud technology without having to make further capital investment or disrupt day-to-day operations.
BRKEWN-3014 - Best Practices to Deploy High-Availability in Wireless LAN Architectures (2013 Orlando) The proliferation of Wi-Fi enabled devices creates a significant challenge for IT organizations to create the same level of service and support on the wireless network as there is on the wired network. The primary goal of this session is to provide design guidance and share best practices around building reliable and highly available Wireless LAN networks. The discussion will focus primarily on how to achieve wireless network survivability and stateful switchover of these wireless packets. All components of the Cisco Wireless LAN network: Prime Infrastructure, WLC, APs and MSE will be covered. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wireless LAN Networks
PSOCOL-1001 - Cisco Collaboration Applications (2013 Orlando) Collaboration Applications help improve productivity with presence, IM, voice, video, conferencing and social software capabilities and they provide a more flexible collaboration environment by making these capabilities available on tablets, smartphones and laptops. Cisco Collaboration Applications consist of WebEx Meetings, for web conferencing, that lets you see, hear, and share content and applications in real-time with others; Jabber, a unified communications application, that helps you find people, see if and how they are available, and instantly collaborate with chat, voice and video; WebEx Social, for social collaboration, that lets you create and securely share content, find experts and resources and more Attendees will learn how: the applications help improve productivity and transform business processes; users can to access these applications from anywhere on their device of choice; the solutions are designed to meet the needs of enterprise IT organizations
BRKARC-2007 - IOS Strategy and Evolution (2013 Orlando) Cisco IOS is the foundational software that is pervasive across the majority of our products. Today, with the melding of various market requirements, we have evolved our software to address these transformative needs with IOS XE, NXOS and IOS XR. The goal of this session is to explain Cisco's overall OS strategy and the shift in networking software development to drive greater consistency, flexibility, and time to market via modularity, componentization and use of an abstraction layer. Our OS infrastructure evolution includes support for a broader set of services providing a lower cost of ownership. We will also discuss the new Release 15 strategy, including the relationship between IOS and IOS XE, explaining how it allows for (delivery of new features and) feature parity across IOS, IOS XE, NXOS, and IOS XR in the future.
BRKCOM-2009 - Deploying Applications in Today's Compute, Storage and Network Infrastructure (2013 Orlando) This session prepares networking engineers for the fundamentals of deploying applications in today�s virtualized server infrastructure. The objectives for this session are to share Cisco Services best practices and tips and tricks implementing Cisco technology such as the Unified Computing System (UCS) and Nexus 1000v with any virtualization stack. During this session we will examine multiple server virtualization use cases and deployments that I have recently architected and implemented. Use cases consist of a multi-tenant private cloud, SAP Hana, Oracle Enterprise Linux �OEL� with Oracle RAC, and a Virtual Desktop Infrastructure �VDI� scaled for thousands of users. This session will show how to utilize a pod concept using Cisco methodologies such as Domain Ten to replicate and scale any server virtualization project that will support today�s enterprise applications. Additional in-depth technical topics covered during this session look at maximizing performance, capacity planning, and Cisco UCS concepts such as template updating, booting bare-metal or hypervisors, and requirements gathering for LAN and SAN virtual interfaces.
ITMGEN-3250 - The Innovation of Everything (2013 Orlando) As the industry begins enabling the Internet of Things, the way we work and do business will change at lightning speed. How do you use innovation to drive creativity? How can you optimize technology to free up other resources? Hear from Carlos Dominguez, a leader in innovation, as he shares his eye-opening ideas about how to prepare for the future.
BRKSEC-3007 - Advanced Cisco IOS Security Features (2013 Orlando) This session mainly covers design and deployment for the Zone-based Policy Firewall (from the foundations to advanced policy construction) and Identity-based features ( Downloadable ACLs, User-based Zone Firewall and the brand new SGT Firewall). Throughout the session, typical troubleshooting tools are largely employed to provide insight about feature operations and interactions, thus establishing the linkages between theory and practice. The session also discusses IOS advanced filtering resources such as specialized ACLs and Flexible Packet Matching and brings information about IPv6 Security features already available on IOS. This Session is targeted at network security specialists who want to learn about important security features in the Cisco IOS Router platform and Network engineers who need a better understanding of the Firewall and Identity functionalities available on IOS Routers. It is important to emphasize that this breakout does not cover VPN, L2 Security, IOS IPS or even IOS hardening techniques. This breakout is a natural follow-on to BRKSEC-2017.
BRKSEC-2900 - Cloud Managed Security with Meraki MX (2013 Orlando) Meraki's cloud managed networking portfolio includes out-of-the-box capabilities to help administrators secure their network environments. This session will provide an introduction to the Meraki architecture and a deep-dive into the Meraki MX security appliance product line. Presenter will feature a live demo of key features such as Auto VPN, client fingerprinting, identity-based policies, intrusion detection, and more.
BRKCOL-2060 - Ignite Your Business! Smart Services for Business Collaboration (2013 Orlando) Collaboration has emerged as an important tool that empowers people to work together in new ways to transform business, accelerate innovation, and do more with less. It's the next-generation of business interaction, where everyone � everywhere -- can be more productive through closer working relationships. But getting there can be painful for organizations that aren�t prepared. Collaboration questions you need to ask include: 1. Is my network ready? 2. Do I have in-house expertise to plan, design ,implement, optimize and maintain a complex solution? 3. Can we monitor and manage collaboration applications and devices? Learn the answers in this introductory session. You�ll have a unique opportunity to learn about Cisco lifecycle collaboration services and tools, and how they enable you to successfully plan, build, and run your network as a powerful business collaboration platform. The session will discuss in detail the Cisco options customers have for Readiness Assessment, PDI, Optimization and Ongoing Management.
BRKRST-2509 - Mastering Data Center QoS (2013 Orlando) All you need to know about Nexus QoS: capabilities, implementation, design and best practices for optimization of applications. From Data (FCoE, NFS, iSCSI, CIFS) to Video and Voice. The hardware capabilities will be explained. The focus is to understand QoS, how to design and configure end-to-end QoS in the Data Centre. Configuration templates and best practices will be provided. The session is targeting Network Engineers and Architects involved in Data Centre designs and implementation. Various Cisco NX-OS series platforms are covered.
BRKSEC-2073 - Threat Defense using NetFlow and ISE (2013 Orlando) Trends such as BYOD and the rise of the Advanced Persistent Threat (APT) are leading to the erosion of the security perimeter and increasingly attackers are gaining operational footprints on the network interior. Participants of this session will learn how to leverage NetFlow and the Lancope StealthWatch System in concert with the Cisco ISE and ASA to gain contextual awareness of network activity in order to identify insidious threats and accelerate incident response. This session will cover how to leverage these technologies to gain visibility throughout the kill chain to accomplish tasks such as identifying command and control channels, detecting network reconnaissance, tracking malware propagation and detecting data loss. The target audience for this session are security administrators and analysts interested in learning how to best leverage NetFlow and other telemetry sources as part of their security toolkit.
COCUCC-2360 - Inside CIsco IT: How Cisco IT introduces new UC and Video Services to its users (2013 Orlando) Advanced Cisco Experience (ACE) network under Cisco IT is used to introduce new Unified Communication and Video Services. These services include new releases of Cisco unified communications, collaboration, video, and mobility technology products that our employees use to work the way they want, across different devices and locations, which drives gains in user productivity. ACE team works with Cisco IT Production network teams to synchronize plans at the network architecture and design level in order to identify risks and roadblocks as well as work through dependencies when a service transitions from testing to production.To ensure the best possible user experience, we integrate the dial plan and user directories across both networks and the engineering-led Alpha networks. This integration means that all of our users, regardless of communication platform, can use the same dialing patterns and click-to-communicate features that are so important for a positive user experience. ACE team also specializes in improving user experience by providing custom solutions like unified portal where users can self manage their devices, sync passwords, change PIN, change Caller-ID etc. ACE Team also solved other challenges like keeping end users programs up-to date and finally capture very useful data analytics which will provide valuable feedback to Cisco Product teams and also overall Cisco IT.
CEWN-001 - Cisco Empowered Women's Network (2013 Cancun) TOMORROW starts here Please join us at the Cisco Empowered Women’s Network (Cisco EWN). This network is a global community of highly motivated professional women who connect at Cisco Live! and throughout the year to exchange thought leadership and grow their careers. It was launched at Cisco Live Orlando. An inclusive tomorrow starts here — and it starts with connecting you to successful and motivated women. Attend this exciting event and prepare to: Get energized with our executive panel of Cisco and customer/partner leaders Get inspired by “real and raw” role models   Únase a nosotros en la red de Cisco Empowered Women's Network (Cisco EWN). Esta red es una comunidad de mujeres profesionales altamente motivadas que se conectan en Cisco Live! y durante todo el año para el intercambio de liderazgo de pensamiento y hacer crecer su carrera. Se inició en junio en Cisco Live Orlando. Un mañana inclusive comienza aquí - y empieza conectando a mujeres exitosas y motivadas. Asista a este emocionante evento y prepárese para: Energizarse con nuestro panel de ejecutivas de Cisco Inspirarse con modelos reales a seguir
Get More Results