UCS-4792 - UCS Security Engineering Overview (2012 San Diego)We will outline key security features and best practices for UCS. This is a session broken into two key areas between the UCS control plane (processes, open ports, organizational boundaries, access methods, etc.) and the UCS data plane (VLAN groups, FEX isolation, DisJoint L2 operations, VM-FEX for isolation to the VM, etc.) and finish up with certification status.
ATE-CL326 - Architecting a Modern Approach to Real Time Business with Vblock Specialized System for SAP HANA (2013 Orlando)Learn how VCE’s new Specialized System is enabling customers to get SAP HANA software up and running in production more smoothly, quickly, and reliably in order to capitalize on the benefits of real-time insights to help address fleeting business opportunities faster.Takeaways:
* Identifying transformational opportunities
* Planning an SAP HANA installation
* Advantages of Vblock Specialized System
For More Information
Visit the VCE virtual resource center to get additional information, download product and solution material, and more.
GENSSN-1616 - Super Session – Intelligent Cybersecurity for the Real World (2014 Melbourne)Driven by market trends in cloud, mobile and the Internet of Everything, technological change is accelerating at lightning speed with the network at the core. Security is no different. Attackers are innovating faster than the industry, finding new attack vectors to exploit their targets and creating significant new security challenges. Join Christopher Young for a discussion on how these phenomena have driven defenders to challenge today’s security assumptions and how Cisco’s new security model and offerings can address our customers’ biggest security problems.
CP-1006 - Network Models and the Network ArchitectOne of the very first things any aspiring network engineer learns is the OSI seven layer model -- but once it's learned, it's often left in the background, another trivia item that doesn't seem to be much use in the real world. Leaving models in the background is, however, a mistake; these are some of the most useful tools the network engineer has to classify and understand protocols and network operation. This session will discuss the history behind the popular seven layer model, and then move into some other models network engineers might find useful, including some you may never have seen before.
Cisco Press book: The Art of Network Architecture: Business-Driven Design by Russ White and Denise Donohue
ATE-CL346 - Build Your Own Innovative Support Applications leveraging Cisco Support APIs (2014 San Francisco)How are APIs delivering both a competitive and support edge to a growing number of companies and IT professionals? A recent survey by Venture Beat found that more than 85% of large companies will have API programs in the next 5 years. Join Alok Patel and colleagues from the Cisco Smart Web Technology Group to explore how –
1. The market landscape of APIs for Enterprise Customers and Channel Partners is changing
2. APIs enable you to pull vital Cisco support data into your own systems on demand
3. Companies are using APIs to unlock business innovation and boost their bottom lines
This session covers the “what,” “why” and “how” of Cisco APIs now available to you. We will spotlight lessons learned, best practices, and exemplary API strategies adopted by Cisco partners and customers.This session also features live demonstrations of Cisco Support APIs, and illustrates how companies are using APIs today to both innovate support solutions and advance business priorities.
For More Information
Visit the Cisco Services Solutions Center to get additional information, download product and solution material, and more.
ATE-CL327 - Security Defined Networks: Deploying Security Defined Networks in the Real World (2013 Orlando)Today’s advanced network security threats are growing in complexity, scale and scope. Highly co-ordinated resources and activities are being leveraged to assault today’s networks with unprecedented speed and agility—a new paradigm in network security monitoring is required in order for organizations to adapt and respond to these threats.
In this presentation, Net Optics VP of Technology & Solutions Sharon Besser defines the next generation approach to security utilizing security-centric SDN, and provides concrete steps organizations must take with their network security and monitoring.
For More Information
Visit the Net Optics virtual resource center to get additional information, download product and solution material, and more.
CIN-WS205 - Activate—Identity Services Engine 1.2Learn about the Cisco Identity Services Engine and the new enhancements available with its most recent release—ISE 1.2. The Identity Services Engine provides a comprehensive, all-in-one solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. During this online event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors. Join Cisco experts Sanjay Raja and David D’Aprile for a closer look at ISE 1.2, and all the advantages it can bring your business.
ATE-CL412 - Application Centric Infrastructure (ACI) (2014 Milan)Learn how Application Centric Infrastructure is ushering in a new era of simplicity and automation, and driving the next generation of data center infrastructure.
For More Information
Visit the Cisco Switching Solutions Center to get additional information, download product and solution material, and more.
ATE-CL408 - Cisco Unified Fabric: Delivering Architectural Flexibility (2013 London)The confluence of a number of trends, including cloud computing, video, virtualization / workload mobility, the data deluge brought on by the “Internet of things,” is driving significant change in the data center. Customers are looking for flexible data center architectures that will adapt to these changes as their business evolve to take advantage of these trends. Cisco’s Unified Fabric and Nexus portfolio deliver this flexibility and continue to lead the industry with a number of leading innovations that enable architectural flexibility for general, virtualized and cloud deployments.
What are these leading innovations and how they enable architectural flexibility that extends from the server to the cloud will be discussed.
Visit the Cisco Switching virtual resource center to get additional information, download product and solution material, and more.
UCS-4797 - Cisco Intelligent Automation for Cloud (UCS) (2012 San Diego)Cisco Intelligent Automation for Cloud is a self-service provisioning and orchestration software solution for cloud computing and data center automation. This session will provide a detailed product overview, followed by an instructor led demonstration of the software suite. We will build off the UCS Manager capabilities describing how this solution automates key data center functions and actions.
ATE-CL338 - Scale your Network Security and Monitoring infrastructure to Keep up with Advanced Targeted Attacks and Big Data Flows (2014 San Francisco)Even as network data has exploded in volume, velocity and variety, network security and monitoring solutions have been behind the curve in adopting new technologies and approaches to cost-effectively scale, and accommodate continuous monitoring in consolidated physical, virtual and cloud based datacenters. The network’s increasing speed and rapidly growing complexity (e.g. virtualization, and tunneling with encryption), pose challenges for IT network and security professionals trying to manage and secure network infrastructure. How does one architect a scalable security & monitoring architecture to withstand the test of time while ensuring adaptability to evolving business needs? The IT organization as a whole needs to ensure end-to-end visibility and data access to meet and exceed business, network and application performance SLAs while keeping their infrastructure and data secure against continually evolving advanced and targeted attacks.
Join Tony Zirnoon, CISSP – Sr. Director Security Strategy VSS Monitoring, as he discusses:
1. Monitoring gaps and security vulnerabilities in today’s traditional network security and monitoring architecture
2. How to address those gaps and vulnerabilities without defaulting to a rip and replace approach
3. Proven best practices in architecting a future-proofed physical or virtual DC monitoring fabric for total network visibility
4. Learn how you can architect a defense-in-depth network security model that scales across converged networks (with real production deployment examples)
5. Future proofing your security infrastructure design and investments against the ongoing barrage of advanced security threats while maintaining high availability and agility to keep up with Big Data flows.
BRKPCS-2059 - ACI Impact on Physical Infrastructure Design and Deployment (2014 San Francisco)Adoption of Cisco’s new Application Centric Infrastructure (ACI) will require some changes to the way data center physical infrastructures are designed and deployed. Depending on the scalability, performance, and applications requirements, customers will need to determine the best physical infrastructure to accommodate a variety of spine/leaf network topologies options including ToR, EoR, and MoR leaf switches. In this session, Panduit examines the physical implementation requirements of an ACI deployment including how to design ToR, EoR and MoR network architectures for ACI, and strategies to simplify the deployment of this next generation architecture in order to help customers accelerate their path to ACI.In addition an overview of available services and product sets that help customers manage risk within the physical infrastructure by intelligently converging physical and logical systems to simplify the deployment will be presented.
GENKEY-1626 - Decoding Connectivity: Leading & Thriving in an “Internet of Everything” WorldThe benefits of connectivity have already changed our world and this is only the beginning. Carlos Dominguez, Senior Vice President of Cisco, brings the Internet of Everything to life in his fascinating keynote during Cisco Live 2013 Melbourne. Learn about what's coming and find your place in this exciting new world. Discover:
• What is the Internet of Everything? • How will it influence and change business – today and in the future? • What is the personal impact each of us will experience?
BRKPCS-2056 - See. Point. Click. Fix. Simplify Your Network with LiveAction (2014 San Francisco)Networks can be complex and difficult to manage, but with LiveAction they don’t have to be. In this session, you will learn how LiveAction simplifies network management. LiveAction is a network performance management tool with deep, rich visualization capabilities, QoS control, analytics, and automation. Attend this session to see how LiveAction can help you get the most ROI from your Cisco products and why it is available through the Cisco Global Price List. See. Point. Click. Fix.
BRKPCS-2058 - Forensically Uncovering Cyber Threats By Monitoring Behaviors (2014 San Francisco)Learn how Security Operation Centers are uncovering internal hosts communicating with botnets, machines participating in DDoS attacks and end systems performing unwanted data exfiltration. Since signature matching is ineffective at detecting many forms of malware, participants will learn how to leverage NetFlow and IPFIX to baseline behaviors and bring visibility to the active threats on the internal network. This session explains how to gain threat landscape clarity and how to avoid a sea of false positives. Learn best practices for leveraging Cisco ISE and Cisco AVC exports to provide richer contextual details surrounding a contagion.
BRKSPG-3630 - Service Driven Network Automation - Powered by Tail-f (2016 Melbourne)Today’s network infrastructure is complex comprising of multiple fragmented domains. Each domain consists of multi-vendor network-elements with vendor specific interfaces and CLIs. Consuming the infrastructure to achieve an outcome is slow and complicated involving multiple EMS/NMS, ad-hoc scripting, complex functional device adapters, error-prone box-by-box manual configuration which are all best-effort and fire-and-forget approaches. Cisco NSO enabled by Tail-f removes this bottleneck by providing a horizontal platform sitting across the network infrastructure decoupling the Services from the infrastructure. NSO manages the infrastructure complexity and exposes the network intelligence via standards based YANG device models. Services, also modelled in YANG, leverage the well-defined device models to consume the infrastructure. This allows for surgical precision, automated and API driven services, transactional guarantees and instant activation of end-to-end Services. With NSO horizontal platform in place bringing new cross-domain and NFV services to the market is achieved in days/weeks.
BRKSEC-2664 - Cisco Sourcefire Advanced Malware Protection and ThreatGrid (2016 Melbourne)Today, the weapon of choice for attackers is malware. Targeted and cunning, advanced malware compromises environments from an array of attack vectors, takes endless form factors, launches attacks over time and can obfuscate the exfiltration of data. The Cisco Sourcefire Advanced Malware Protection (AMP) solution spans extended networks and devices to focus on threats across the full attack continuum - before, during and after - an attack.This session will provide the audience an overview of Cisco Sourcefire Advanced Malware Protection (AMP) solution - Advanced Malware Protection for Networks, and Advanced Malware Protection for Endpoints.
BRKSEC-1205 - Introduction to DC Security (2016 Melbourne)With IT departments increasingly centralising and virtualising all of their resources into the Data Centre Management and the Cloud, the security of those resources is becoming increasingly important. Security must permeate throughout applications, the virtualisation layer, compute, storage and network. Unfortunately, security is often left to a limited number of specialists, and understanding of the technologies used is often limited to those same experts. This session will outline how security can be propagated throughout the Data Centre Management and define how these technologies can work together to build a secure Data Centre Management and Cloud strategy for the enterprise. Topics covered will include Current Threats, Security Hardware and Software, Network Segmentation, Cloud Connectivity, Software Defined Networks, Data Centre Management Interconnects, Security Architectures and more. This session will provide an overview to anyone interested in how Security can be inserted in their Data Centre.
BRKSPG-2619 - Cisco Evolved Programmable Networks (2016 Melbourne)As competition in Carrier services market intensifies Service providers are challenged to make services more agile, simplify networks and reduce operational costs while growing the capacity.
Cisco Evolved Programmable Network (EPN) provides an open programmable network architecture covering both physical and virtual network resources. In EPN architecture SDN controllers and consecutively applications are able to orchestrate network resources and facilitate network telemetry analytics in real time to optimise operations, ensure high availability & avoid brownouts. Open APIs used in the Architecture bring the full automation and on-demand programmability to enable flexible resource & service allocation.
The session will provide an overview of use cases/applications to leverage EPN in Internet Infrastructure, Carrier Ethernet & Mobile Backhaul layers. It will also review a set of Open APIs available on Carrier routing platforms and guide on relevant SDN controllers/orchestration middleware to build flexible automated network. Lastly the session will include demonstration of the Opendaylight (ODL)-based application which is using the EPN.
BRKSEC-2693 - ELK for Enterprise IR Visibility (2016 Melbourne)Cyber Security presents an ever changing and increasing challenge to individuals, corporations and nation states. It is no longer a case of "If' or "whether" an organisation will be subjected to a cyber attack of one kind or another. Today's reality is that it has probably already occurred. Cisco uses the concept of an "Attack Continuum" to highlight that if an organisation is to respond effectively to this reality, it needs to be prepared in advance and know what to do Before, During, and After an attack.
PCSZEN-1022 - Reinventing applications FOR REAL - how the co-evolution of hardware and software make it possibleThe last few decades have brought about a dramatic transformation in both hardware and software development. Changes to one drive changes to the other, all with the aim of moving away from monolithic applications deployed on huge custom machines to agile, infinitely scalable services deployed on high-performance, cost-effective, software-defined networks and infrastructure. This talk will share some of the history that has led to this point, and offer insights on how these new systems can help you shape your own IT evolution from traditional data center virtualization to hybrid cloud models, microservices architectures and beyond.
PSOSEC-2003 - Key Security Measures to Enable Next-generation Data Center Transformation (2015 San Diego)Part of the tension between IT and security has been the all-too-often correct perception that security interrupts and slows down business-critical applications and services. Nowhere is this more apparent than in the data center, where complex traffic, customized applications, virtualization, and dynamic resource scalability are essential to the health and success of the organization.
In this presentation we will look at Cisco's next-gen ACI data center solution from a security perspective. This session will focus on key ACI security measures that executives and data center teams need to understand when considering data center innovation and to move the business forward quickly.
1. Unmatched Agility that enables dynamic security provisioning designed for next-gen data center environments.
2. Integrated Protection that leverages native ACI security combined with ASA NGFW and FirePOWER NGIPS.
3. Dynamic Control that provides transparency, forensics and remediation through Cisco AMP, PCI compliance, and the ability to dynamically audi change
PSOGEN-1105 - Develop Mobile Apps and Interactive Displays with Cisco Connected Experience (2015 San Diego)Delivering engaging mobile and interactive experiences in the world of IoE requires more than a good user interface. It requires aggregation and delivery of the right information, the right capabilities, at the right time, on any device at the point of use. It requires bringing together network information, collaboration capabilities, business applications, and data that is relevant to the user to enable context-aware, personalized, and productive interactions. Cisco Connected Experiences software helps developers deliver rich personalized information to engage people in context. Join this session to learn how we are combining the best technologies from Cisco and our partners to provide powerful mobile and interactive display platforms that help you to address the increasing expectations of your end users.
BRKSPG-2116 - Advances in IP+Optical (2015 San Diego)As Service providers around the world look at expanding their core networks, we will re-examine the advances in IP+Optical integration and architecture. We will review optical consideration factors for IP+Optical design, including G.709, optical impairments, and modulation schemes, including the modulation scheme for coherent 100G. We will cover IP+Optical architectures that include placement of high speed optics in the router or an optical shelf as well as management of IP+Optical networks. New trends in ROADM functionality are discussed that enable a more seamless integration with core routers that includes omnidirectional, contentionless add/drop and flex spectrum. We will conclude with current and future use of multi-layer control plane in converged optical and routing networks along with coordinated protection schemes.
PSODCT-2171 - Cisco and Microsoft Hybrid Cloud Solutions (2015 San Diego)**The video for this session is unavailable.**
The session will feature how Cisco and Microsoft are delivering together, Service Provider and Enterprise based Cloud Platforms from the perspective of the consultants who deliver them. The architecture will show the additional features, supporting Service Provider model, and ultimately support additional cloud platforms in addition to Microsoft. Initial target customers are large enterprise, Service Provider and government, with subsequent releases to support additional products, and a broader market. This presentation introduces an architecture for a platform to support System Center, Windows Server 2012 R2, Windows Azure Pack in concert with Cisco Hardware and Software solutions. Deployments include the use of the Microsoft Service Provider Reference Architecture (SPRA), and Cisco Validated Design for Microsoft FastTrack v4, which have a proven capability and scale to support a large number of multi-tenant enterprise and service provider workloads./p>
PSODCT-2001 - Scalable Data Center Networks with Nexus 2K, 5K, 7K Product Architectures (2015 San Diego)**The video for this session is unavailable.**
Cisco leads the way in Data Center architectures and has a wide range of DC deployments using the Nexus 2K, 5K and 7K product architectures. The Nexus product line addresses the varied requirements of Data Centers across varied market segments and geographies. The Nexus 2K, 5K and 7K portfolio consists of multiple flavors with leading technologies (including overlay, virtualization and cloud), fabric architectures, ease of deployment and management with solutions like FEX. The product lines being presented in this session continue to be the most deployed DC products in the industry and are evolving into multiple new products to meet the growing needs of modern Data Centers, to inter-work with current architectures and have the ability to meet future demands.
BRKIPM-1261 - Introduction to IP Multicast (2015 San Diego)This session is an overview of the fundamentals of IP Multicast, with some history and background on the development of IP Multicast. It covers the basics of IP Multicast components such as addressing at Layers 2 and 3, host-router signaling (IGMP v1-v3), distribution trees, and Reverse Path Forwarding. The session provides an overview of Protocol Independent Multicast-Sparse Mode (PIM-SM) and its various modes of operation. Bidirectional PIM, Source Specific Multicast, the concepts of several interdomain multicast protocols such as Multiprotocol Border Gateway Protocol (MBGP) and Multicast Source Discovery Protocol (MSDP), Automatic Multicast Tunnels (AMT) are briefly introduced. Also included is a brief overview of IPv6 Multicast. This session is for network engineers who have no previous background in IP Multicast.
GENSSN-1625 - Data Centre Technology Super Session (2015 Melbourne)Are Applications Driving Your Business Outcomes? Let ACI Automate Your Infrastructure
Applications run our business, simplify processes, and help make our lives easier. Wouldn’t it be nice to have an infrastructure that kept pace, allowing you to focus on your business outcomes? With ACI as your foundation, you can create a cloud environment that quickly builds, operates and scales. Learn and understand current technology trends that continue to guide ACI development now and far into the future. Learn how ACI drives IT automation through the creation of an agile infrastructure. Hear directly from customers about their journey to date and where they want to go. And find out how truly open ACI is from operational choice to open APIs from customers, partners and developers. The future of networking is available today, allowing you to create your own map of endless possibilities.
BRKNEG-1209 - AXTEL (2015 Cancun)Esta charla pretende mostrar los aspectos normativos y de cumplimiento que rodean a las soluciones de Infraestructura como Servicio (IaaS) y Escritorio como Servicio (DaaS) mediante una base de soluciones de seguridad (SECaaS) la cuál cuenta con una serie de controles técnicos y administrativos para mantener altos estándares en temas de seguridad y protección de datos.
Tocando los siguientes puntos relevantes:
Infraestructura homologada por fabricantes
Procesos alineados con estándares
BRKSPV-1261 - Designing an Online Video Service (2014 Milan)Streaming Video has been around for many years but with the advent of tablets & high speed broadband it has come into its own. This workshop will focus on the new wave of video delivery technologies used in “Over-the-Top” environments & explore the best practice designs used when building such a streaming video service. The session will start by looking at what we are setting out to achieve, and methodically set out the system architecture and each of the various elements that will contribute to the solution, and conclude with a typical example use case.
BSAARC-1011 - Borderless Networks (2013 Orlando)This session reviews the Borderless Network Architecture in depth. With the explosion of devices, video, cloud, BYOD, and other market trends, the capabilities that Borderless Networks provides brings tremendous value to the enterprise. This session will review the main architecture pillars and the requisite services provided by the Borderless Network: Cloud Intelligent Network SecureX Unified Access Connected Industries
BRKPCS-2028 - Unified, Flexible and Affordable Network Management (2013 Orlando)Network management technology should be designed to make managing IT environments and delivering services to users less complicated – without sacrificing adaptability or draining budgets. In this session, a solutions expert from Ipswitch (WhatsUp Gold) will share proven best practices to help you simplify IT operations by unifying network management, log management, and application performance monitoring with a solution that makes both your tasks and your network easier to manage. Our experts will dig deep into systems, networks, services, applications – and those who rely upon them to do their jobs – to uncover common challenges and considerations when addressing a comprehensive approach to IT management. In tandem, you’ll hear from a peer (aka, one of our customers) who will share real-world experiences and tangible results that will help you further identify how our solutions can provide tangible benefits to your network environment.
PNLRST-4006 - Get More from Your Network with an Intelligent WAN (2014 Milan)Today’s WAN environments face growing pressure with the adoption of cloud, mobility and rich media applications. Yet, three out of four organizations report no growth in WAN budget. Many organizations are expected to deploy new services like BYOD, guest access, software-as-a-service, and need to determine how to meet the demands of the business without additional resources.
In this session, you will learn how to improve WAN performance, reliability and security while lowering costs and simplifying operations. You’ll hear real-world examples how others like you are leveraging the services of Cisco IWAN to deploy consistent security across a hybrid WAN, increasing their WAN utilization with up to five-nines reliability, and improving user experience with business continuity.
Join our expert panel of customers from Qualcomm, Genworth and SFR, and learn how Cisco Intelligent WAN (IWAN) can help you more efficiently utilize your WAN to meet your business requirements, quickly pay for an infrastructure upgrade and free up IT resources for strategic projects.
COCEVT-3466 - Inside Cisco IT: Making Video the new Voice - a Cisco IT Cookbook (2014 Milan)In the next 5 years most enterprises are going to expect video capabilities to be broadly available to their employees as a standard collaboration capability. If you haven't started yet; It is time to get your infrastructure video ready! Join the Service Manager and lead Design Engineer for Cisco IT UC & Video Platforms to learn how Cisco IT has served up pervasive video to its multinational enterprise and is enabling video to be the default real-time communication tool. In this session you will learn about Cisco IT's video service journey; discover some of the key ingredients and overview some of technical recipes that have been used by Cisco IT to deliver its menu of video services.
BRKGS-2526 - Driving UC Adoption across all platforms, mobile, desktop and meeting room. (2014 Milan) Despite data suggesting increased investment and deployment, the past decade has seen much lower true adoption of Unified Communications (UC) than expected. This is in part due to end-user barriers, including difficulty installing and using devices, as well as a lack of true understanding of the benefits of UC. This partner session will tackle these challenges and help businesses move to higher adoption rates and more productive use of the Cisco Collobration tools in which they have already invested. This presentation will include both hardware and software elements, as well as best practices for driving adoption at the end user level.
Please note that the session length is 20 minutes.
BRKDCT-2255 - Cisco's Cloud Ready Infastructure - VMDC (2014 Milan)Cisco Virtualized Multi-tenant Data Center solution (VMDC) is an architectural approach to IT which delivers a Cloud Ready Infrastructure. The architecture encompasses multiple systems and functions defining a standard framework for an IT organization. Standardization allows the organization to achieve operational efficiencies, reduce risk and achieve cost reductions while offering a consistent platform for business. This session will address the physical and logical construction of Cisco's VMDC system which provides a validated approach to both enterprise and service provider cloud deployments. Particular attention will be paid to the controlled consumption of cloud resources and isolation of workloads on a shared infrastructure consisting of the Cisco Nexus 7000, 5000 and UCS platforms. In addition, enhanced security providing isolation, visibility, access controls and policy enforcement using Cisco's ASA technologies, Virtual Security Gateway, and Prime NAM will be detailed.
BRKSEC-3770 - Advanced Email Security with ESA (2013 Orlando)This technical session will tackle several advanced topics of e-mail security with a focus on Cisco's solution. We shall begin by describing the level of IPv6 support in newer versions of AsyncOS, and what changes this brings to traditional e-mail processing. Second part of the session will talk about recent trends of migrating towards the Cloud or Hybrid Cloud e-mail security solution, and what are the challenges and migration consideration. This will be followed by a section on Message Filters, a powerful mechanism of mail flow filtering which was deliberately neglected out of caution. Several Anti-phishing techniques will be laid out in the remainder of the session, outlining Cisco's Outbreak Filters, and providing insight into DKIM and SPF deployment considerations. Prerequisites for this session are acquaintance with SMTP and e-mail security technologies; experience with Cisco E-mail Security products is desirable. The target audience are security and email administrators of the enterprise email gateway. The audience will also benefit from following the session BRKSEC-3771 ';Advanced Web Security Deployment with WSA'; and BRKSEC-2695 ';Embrace Cloud Web Security with your Cisco Network';
BRKPCS-2015 - Cloud Case Study: How Verizon's Cisco Powered services enable Warner Brothers in the cloud (2013 Orlando)Many businesses and organizations evaluating cloud technology are concerned about how they can migrate from existing premise-based infrastructure to hybrid architectures comprised of premise-, managed-, and cloud-based services. This session will describe how one of Verizon�s customers has successfully completed the transition to cloud and how they implemented a solution that aligns with their business needs and scale. You will learn best practices for evaluating various cloud services, including how to verify that services will provide the performance and reliability you have come to expect from your own enterprise network, how to accelerate return on investment, and how to be able to leverage ongoing innovation in cloud technology without having to make further capital investment or disrupt day-to-day operations.
BRKEWN-3014 - Best Practices to Deploy High-Availability in Wireless LAN Architectures (2013 Orlando)The proliferation of Wi-Fi enabled devices creates a significant challenge for IT organizations to create the same level of service and support on the wireless network as there is on the wired network. The primary goal of this session is to provide design guidance and share best practices around building reliable and highly available Wireless LAN networks. The discussion will focus primarily on how to achieve wireless network survivability and stateful switchover of these wireless packets. All components of the Cisco Wireless LAN network: Prime Infrastructure, WLC, APs and MSE will be covered. This session is applicable for attendees responsible for the design, deployment, operations, and management of highly available Wireless LAN Networks
PSOCOL-1001 - Cisco Collaboration Applications (2013 Orlando)Collaboration Applications help improve productivity with presence, IM, voice, video, conferencing and social software capabilities and they provide a more flexible collaboration environment by making these capabilities available on tablets, smartphones and laptops. Cisco Collaboration Applications consist of WebEx Meetings, for web conferencing, that lets you see, hear, and share content and applications in real-time with others; Jabber, a unified communications application, that helps you find people, see if and how they are available, and instantly collaborate with chat, voice and video; WebEx Social, for social collaboration, that lets you create and securely share content, find experts and resources and more Attendees will learn how: the applications help improve productivity and transform business processes; users can to access these applications from anywhere on their device of choice; the solutions are designed to meet the needs of enterprise IT organizations
BRKEWN-2027 - Design and Deployment of Outdoor Mesh Wireless Networks (2013 Orlando)This intermediate session will describe the Outdoor wireless products involved in delivering outdoor broadband wireless services for Service Providers, Municipalities, Transportation and other end user customers. The Cisco Outdoor Wireless Bridging and MESH Technologies will be discussed in detail. The session is intended for wireless network architects, network designers, network planners working in Service Providers, Systems Integrators, small providers and enterprise customers. Attendees should have some base knowledge in configuration of IP routers, Wi-Fi access points, and policy management. Basic understanding of Controller Architecture and Service Provider networks and services is required.
BRKARC-2007 - IOS Strategy and Evolution (2013 Orlando)Cisco IOS is the foundational software that is pervasive across the majority of our products. Today, with the melding of various market requirements, we have evolved our software to address these transformative needs with IOS XE, NXOS and IOS XR. The goal of this session is to explain Cisco's overall OS strategy and the shift in networking software development to drive greater consistency, flexibility, and time to market via modularity, componentization and use of an abstraction layer. Our OS infrastructure evolution includes support for a broader set of services providing a lower cost of ownership. We will also discuss the new Release 15 strategy, including the relationship between IOS and IOS XE, explaining how it allows for (delivery of new features and) feature parity across IOS, IOS XE, NXOS, and IOS XR in the future.
BRKNMS-2695 - Administration and monitoring of the Cisco DataCenter with Cisco Prime DCNM (2013 Orlando)Cisco Prime DCNM is the global solution for the management of the Cisco DataCenter, including both LAN, SAN and unified networks. DCNM provides a comprehensive set of management features across the whole range of NX-OS platforms, and down to the Virtual Machines. These features include the discovery, inventory, configuration and change management, NX-OS software management, template-based provisioning, proactive monitoring, performance monitoring and capacity planning, topology views and troubleshooting tools. This session will explore those features and highlight some best practice methodology to get the most out of DCNM. A basic understanding of the underlying technologies is needed, together with some network management skills.
BRKIPM-2008 - Advanced Topics in IP Multicast Deployment (2013 Orlando)This session covers tools and techniques that will assist with deploying IP Multicast. We begin with some configuration examples which discuss PIM modes and Rendezvous Point Deployment models for PIM SM domains Examples are then given for ways of interconnecting separate PIM domains is provided A description of a technology called Automatic Multicast Tunnels (for extending multicast content between sites which are not homogeneously connected) is provided We discuss the integration of multicast with MPLS (Label Switched Multicast). We discuss ways of delivering a highly available multicast service. We briefly discuss the deployment of IP Multicast in a wireless environment. This session is primarily for network engineers in enterprise and service provider network environment. Attendees should have a basic understanding of IP Multicast