Cisco Cisco MGX-FRSM-HS2 B Serial Frame Service Module Merkblatt
Solution Overview
© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 11
Cisco Application Control Engine and Cisco Nexus 7000
Series Multi-tenancy
Series Multi-tenancy
What You Will Learn
As the IT landscape rapidly changes, cost reduction pressures, focus on time to market, and employee
empowerment are leading enterprises and IT service providers to develop innovative strategies to address
these challenges. In existing deployments, environments that needed additional security and isolation
required separate sets of equipment and infrastructure. Although this approach provided the required
separation, efficiency dropped significantly due to lower utilization, while costs increased due to higher
management and capital expenditures. The multi-tenant architecture addresses these concerns through a
secure, isolated multi-tenant solution at every network layer.
Challenge
As enterprise IT environments have dramatically grown in scale, complexity, and diversity of services, they have
typically deployed application and customer environments in silos of dedicated infrastructure. These silos are built
around specific applications, customer environments, business organizations, and operational requirements. For
example:
●
Universities need to separate student user services from business operations, student administrative
systems, and commercial or sensitive research projects.
●
Telcos and service providers must separate billing, customer relationship management (CRM), payment
systems, reseller portals, and hosted environments.
●
Financial organizations need to securely isolate client records and investment, wholesale, and retail banking
services.
Enabling enterprises and service providers to migrate such environments to a multi-tenant architecture requires the
capability to provide secure isolation while still delivering the management and flexibility benefits of shared
resources. Enterprises and external service providers must enable all customer data, communication, and
application environments to be securely isolated from other tenants. With external providers, the separation must be
so complete and secure that the tenants can have no visibility to each other. Enterprises must deliver the secure
separation required for their organizational structure, applications, and regulatory compliance.