Cisco Cisco Tetration Analytics G1 白書
June 2016, IDC #US41485516
IDC Business Value Brief: Cisco Tetration Analytics
Cisco Datacenters Get Pervasive Visibility and Reduced
Security Risk with 70% Less Time and Cost
Sponsored by: Cisco
Matthew Marden
June 2016
June 2016
Overview
Cisco Systems, with over 70,000 employees and annual
worldwide revenue of close to $50 billion, is a leading
provider of networking solutions. In total, Cisco has almost
3,000 business applications at datacenters around the world
that support its employees and customer-facing services. At
this scale of operations, Cisco must constantly improve its
ability to balance performance, agility, security, and cost.
worldwide revenue of close to $50 billion, is a leading
provider of networking solutions. In total, Cisco has almost
3,000 business applications at datacenters around the world
that support its employees and customer-facing services. At
this scale of operations, Cisco must constantly improve its
ability to balance performance, agility, security, and cost.
Cisco IT has been engaged in a multiyear transformation to
simplify:
simplify:
Migration of select applications to a private cloud
Implementation of software-defined networking–
(SDN)-based zero-trust operations
(SDN)-based zero-trust operations
Compliance with evolving security policies
In particular, security has been and remains a priority for
Cisco, even as the explosion of east-west traffic in recent
years has greatly expanded the attack surface. To bolster
security, Cisco has wanted to implement "zero-trust
operations" that include the use of whitelist policies. This
operating model changes default communication
permissions between applications from "permit any" to
"permit none" unless explicitly otherwise allowed. This
prevents attacks from propagating across applications,
tenants, and data. Compliance can be validated quickly by
comparing actual traffic flows with whitelist policies in place.
Cisco, even as the explosion of east-west traffic in recent
years has greatly expanded the attack surface. To bolster
security, Cisco has wanted to implement "zero-trust
operations" that include the use of whitelist policies. This
operating model changes default communication
permissions between applications from "permit any" to
"permit none" unless explicitly otherwise allowed. This
prevents attacks from propagating across applications,
tenants, and data. Compliance can be validated quickly by
comparing actual traffic flows with whitelist policies in place.
Cisco understands that successful private cloud migration,
zero-trust operations, and compliance require visibility into the
complex dependencies between application components,
users, and databases. Understanding inherent dependencies
for all of Cisco's thousands of distributed business applications
would be prohibitively expensive if done manually. Further,
Cisco would risk blocking application flows and carrying out
ineffective migrations without full visibility.
zero-trust operations, and compliance require visibility into the
complex dependencies between application components,
users, and databases. Understanding inherent dependencies
for all of Cisco's thousands of distributed business applications
would be prohibitively expensive if done manually. Further,
Cisco would risk blocking application flows and carrying out
ineffective migrations without full visibility.
Business Value Highlights
Organization: Cisco
Location: San Jose, California
Challenge: Improve compliance and
create a zero-trust security
environment by understanding all
traffic flows with minimal effort while
enabling migration of thousands of
applications to SDN and cloud
Solution: Cisco Tetration Analytics
Expected benefits from the use of
Cisco Tetration:
Location: San Jose, California
Challenge: Improve compliance and
create a zero-trust security
environment by understanding all
traffic flows with minimal effort while
enabling migration of thousands of
applications to SDN and cloud
Solution: Cisco Tetration Analytics
Expected benefits from the use of
Cisco Tetration:
Avoid 3,650 hours of IT staff
time per 100 applications (70%
less staff time) in dependency
mapping and establishing zero-
trust operations
time per 100 applications (70%
less staff time) in dependency
mapping and establishing zero-
trust operations
Other projected benefits:
IT staff time savings to:
Create natural groupings of
internal users, partners,
labs, databases,
infrastructure, and so forth
internal users, partners,
labs, databases,
infrastructure, and so forth
Improve availability and
performance of user
applications
performance of user
applications
Identify infrastructure cost
efficiencies
efficiencies
Validate compliance of
existing application flows
existing application flows
Enable error-free
application traffic analysis
application traffic analysis