Cisco Cisco Tetration Analytics G1 白書

ページ / 10
June 2016, IDC #US41485516
IDC Business Value Brief: Cisco Tetration Analytics
Cisco Datacenters Get Pervasive Visibility and Reduced 
Security Risk with 70% Less Time and Cost
Sponsored by: Cisco
Matthew Marden
June 2016
Overview
Cisco Systems, with over 70,000 employees and annual 
worldwide revenue of close to $50 billion, is a leading 
provider of networking solutions. In total, Cisco has almost 
3,000 business applications at datacenters around the world 
that support its employees and customer-facing services. At 
this scale of operations, Cisco must constantly improve its 
ability to balance performance, agility, security, and cost. 
Cisco IT has been engaged in a multiyear transformation to
simplify:
Migration of select applications to a private cloud
Implementation of software-defined networking–
(SDN)-based zero-trust operations
Compliance with evolving security policies
In particular, security has been and remains a priority for 
Cisco, even as the explosion of east-west traffic in recent 
years has greatly expanded the attack surface. To bolster 
security, Cisco has wanted to implement "zero-trust 
operations" that include the use of whitelist policies. This 
operating model changes default communication
permissions between applications from "permit any" to 
"permit none" unless explicitly otherwise allowed. This 
prevents attacks from propagating across applications, 
tenants, and data. Compliance can be validated quickly by 
comparing actual traffic flows with whitelist policies in place.
Cisco understands that successful private cloud migration, 
zero-trust operations, and compliance require visibility into the 
complex dependencies between application components, 
users, and databases. Understanding inherent dependencies 
for all of Cisco's thousands of distributed business applications 
would be prohibitively expensive if done manually. Further, 
Cisco would risk blocking application flows and carrying out 
ineffective migrations without full visibility. 
Business Value Highlights
Organization: Cisco
Location: San Jose, California
Challenge: Improve compliance and 
create a zero-trust security 
environment by understanding all 
traffic flows with minimal effort while
enabling migration of thousands of 
applications to SDN and cloud
Solution: Cisco Tetration Analytics
Expected benefits from the use of 
Cisco Tetration
:
Avoid 3,650 hours of IT staff 
time per 100 applications (70% 
less staff time) in dependency 
mapping and establishing zero-
trust operations 
Other projected benefits:
IT staff time savings to:
Create natural groupings of 
internal users, partners, 
labs, databases, 
infrastructure, and so forth
Improve availability and 
performance of user 
applications
Identify infrastructure cost 
efficiencies 
Validate compliance of 
existing application flows
Enable error-free 
application traffic analysis