E-Commerce Networking

Similar documents
Designing Internet Commerce and Content Networking Architectures

Exam: : VPN/Security. Ver :

Ensuring the Success of E-Business Sites. January 2000

Exam: Title : VPN/Security. Ver :

SteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE

Cisco Self Defending Network

A Unified Threat Defense: The Need for Security Convergence

Logical Network Design (Part II)

A Single Cloud for Business Applications

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Hosting Roadmap Upgrades, Improvements and Changes

White paper. Keys to Oracle application acceleration: advances in delivery systems.

Never Drop a Call With TecInfo SIP Proxy White Paper

THE UTILITY OF DNS TRAFFIC MANAGEMENT

Cisco SR 520-T1 Secure Router

War Stories from the Cloud Going Behind the Web Security Headlines. Emmanuel Mace Security Expert

90 % of WAN decision makers cite their

IP Application Accelerator

Corporate Profile. Solutions & Services

How Managed Service Providers Can Meet Market Growth with Maximum Uptime

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Networks

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

Introduction. The Safe-T Solution

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Optimizing Web and Application Infrastructure on a Limited IT Budget

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

Transform your network and your customer experience. Introducing SD-WAN Concierge

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Imperva Incapsula Product Overview

Application Delivery Solution Ensure Availability, Performance and Security of Mission-critical Applications in the Physical and Virtual Data Center

Networking Strategy and Optimization Services (NSOS) 2010 IBM Corporation

Oracle and Tangosol Acquisition Announcement

Transform your network and your customer experience. Introducing SD-WAN Concierge

THE WORLD S BEST- CONNECTED DATA CENTERS EQUINIX MIDDLE EAST & NORTH AFRICA (MENA) Equinix.com

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners

Cisco ASA 5500 Series IPS Solution

MariaDB MaxScale 2.0, basis for a Two-speed IT architecture

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

The Future of Business Continuity & Resiliency

Future-ready security for small and mid-size enterprises

How Cisco ASR 1000 Enables Cisco Business Strategies by Providing Capacity and Resiliency for Collaborative Applications

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Radware AppDirector Load Balancing Microsoft LCS servers, LCS Director and LCS Access Proxy Servers.

Building Resilience to Denial-of-Service Attacks

The Little Fuchsia Book of HPE Data Center Solutions

How Cisco IT Deployed Cisco Firewall Services Modules at Scientific Atlanta

Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA)

IBM TS7700 grid solutions for business continuity

Unified Communications from West

MOVE TO A FLEXIBLE IT MODEL ENTERPRISE DATA CENTER SOLUTIONS.

IBM Resiliency Services:

Maximum Security, Zero Compromise in Availability and Performance

Flexible Capacity. Giovanna Guglielmi Flexible Capacity e Datacenter Care Business Manager Hewlett Packard Enterprise Italia

Ensuring Business Resilience Jim Neumann, Vice President of Marketing, Power Analytics Corp.

DATA CENTRE SOLUTIONS

Business Continuity & Disaster Recovery

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

A Technical Overview of the Lucent Managed Firewall

More companies are turning to technology to help boost their bottom line

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

AKAMAI CLOUD SECURITY SOLUTIONS

Data Retrieval Firm Boosts Productivity while Protecting Customer Data

Check Point Virtual Systems & Identity Awareness

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved

Cisco ASA 5500 Series IPS Edition for the Enterprise

Cisco Prime Cable Provisioning 5.1

BREAK THE CONVERGED MOLD

Managed IT Services Eliminating technology pains for SMBs

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Please give me your feedback

Cisco 5921 Embedded Services Router

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

ASA/PIX Security Appliance

Step into the future. HP Storage Summit Converged storage for the next era of IT

Zeeshan Naseh, CCIE No Haroon Khan, CCIE No. 4530

CCNA Discovery 4.0 Designing and Supporting Computer Networks

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

APSolute Integrated Application Delivery

An Introduction to DDoS attacks trends and protection Alessandro Bulletti Consulting Engineer, Arbor Networks

Cisco Prime Cable Provisioning 5.1

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Angelo Gentili Head of Business Development, EMEA Region, PartnerNET

Achieving End-to-End Security in the Internet of Things (IoT)

Service Oriented Datacenter. Presented by Tan Lee Ann General Manager Datacenter Storage Solutions Group

Transcription:

NW2000 1 E- ing Session 2

E-Business Solution Suppliers/ Manufacturers Supply Chain Management Business Partners E- Customers Customer Care Resellers Employees Your Company E- Learning 3 1999 E- Data During holidays, sites took an average of 21 seconds to load and were only accessible 90% of time. 3 Less than 75% of holiday orders were delivered on time. 2 48% of online shoppers abandoned site due to slow download and 20% had to contact customer service. 5 Two-thirds of firsttime buyers don t make a repeat purchase. 6 Worldwide e-commerce Revenue reached $111 billion. 1 28% of shoppers failed to complete an attempted purchase. 5 Holiday e-commerce sales reached $5 billion. 4 16% of retailers failed to fulfill orders. 7 Sources: 1 International Data Corp., 2 Bizrate.com, 3 Keynote Systems, 4 Forrester Research, 5 Boston Consulting Group, 6 McKinsey & Co., 7 e-buyersguide.com 4

E-: Beyond Online Order Taking 2. Serve customers relevant content 3. Provide easy-to-use and efficient purchase mechanism Inform Acquire Target 1. Identify and target customers Transact Transact E- Lifecycle Target Grow Grow Service Pay Deliver 4. Provide payment and financing functions 5. Provide fulfillment and delivery of products 6. Expand offering to address new and evolving customer needs 5 E- Evolution Relationship Management Online Information Online Ordering Order Placement Pricing Integrated Ordering Site Personalization Supplier Integration Order Status Integrated Customer Service Digital Communities Electronic Marketplaces Old Way Handwritten P.O.s Presence FY 96/97 97/98 98/99 99/00 6

E- Technical Challenges Challenges: Meet growth in customer demand Protect e-commerce site Maximize service uptime Customer Hacker Solutions: Scalability Security Availability Server 7 E- Scalability Cache Engine DistributedDirector ISP Customers Catalyst Switch LocalDirector Meet growing customer demand Improve user response times Deliver quality of user experience 8

Growth of Sites Page View Growth (Monthly) Number of Page Views (Daily) Transaction Growth (Monthly) Number of Transactions (Daily) Average Transaction Value (Monthly) Maximum 400% 87,000,000 400% 30,000 $175,000 Average 53% 3,684,000 96% 12,700 $13,400 Median 19% 30,000 33% 1000 $90 Minimum 0% 10 0% 10 $18 Source: Forrester Research, Feb 2000 Statistics for 50 online companies doing transactions 9 Server Load Balancing ISP Customers LocalDirector Distributes client requests across multiple servers Redirects traffic to best server Stateful failover for uninterrupted service 10

Accelerated Server Load Balancing (ASLB) Catalyst 6500 LocalDirector ISP Customers LocalDirector removed from forwarding path Flows cached in switch Requires Catalyst 6000s Improves packet forwarding to 15 Mpps 11 Content Caching Cache Engine ISP Customers Reverse-proxy caching Offloads static content from web server Accelerates content delivery Reduces server requirements 12

Geographic Load Balancing DistributedDirector Alternate Site ISP Redirects users to nearest web site Optimizes use of geographically distributed servers Improves user response times 13 E- Security Cisco Secure Scanner Cisco Secure Intrusion Detection System Cisco Secure PIX Firewall Cisco IOS Services Edge Router ISP Hacker Establish security perimeter Automatically detect and deny intruders Prevent malicious attacks Report security violations 14

Is Your Site Safe? Site Auction Site Retail Site Trading Site Outage 2/8/00: One-hour outage Distributed denial of service attack 2/8/00: Site traffic blocked Distributed denial of service attack 2/9/00: One hour of disrupted service Distributed denial of service attack Protecting Against DDoS Attacks: http://www.cisco.com/warp/public/707/newsflash.html 15 Access Security Cisco IOS Services Edge Router ISP Hacker Packet Filtering First layer of defense Filters according to access lists ACLs based on SRC/DST address, protocol, port #, etc. Firewall Feature Set Stateful application firewalling Denial of service detection and prevention Secure virtual private networking (VPN) 16

Intrusion and Security Violation Detection Cisco Secure Scanner Cisco Secure IDS Cisco IOS with IDS ISP Hacker Intrusion Detection System Real time network-based intrusion detection Signature detection identifies content and context-based attacks Automated policy-based response Cisco Secure Scanner Proactively identifies security weaknesses Defines security policies Comprehensive and flexible reporting 17 Firewall Security Cisco Secure PIX Firewall ISP Hacker Stateful, connection-oriented firewall Maximum performance IPSec VPN support Stateful failover capability 18

E- High Availability Cisco Secure PIX Firewall Cache Distributed Engine Director Distributed Director Remote Site ISP 1 ISP 2 LocalDirector Catalyst 6500 Optimize session and service availability Design for redundancy and resiliency Distribute e-commerce services geographically 19 Measuring Availability Availability Downtime Per Year (24x7x365) 99.000% 3 days, 15 hours, 36 minutes 99.500% 1 day, 19 hours, 48 minutes 99.900% 8 hours, 46 minutes 99.950% 4 hours, 23 minutes 99.990% 53 minutes 99.999% 5 minutes Unplanned and Planned Downtime 20

E- Downtime Revenue Loss Daily revenue as of 1/15/99 www.amazon.com $2,700,000 Lost revenue per hour of downtime (assumes 20% revenue loss) $22,500 www.dell.com www.cisco.com www.intel.com (partner extranet site only) $10,000,000 $20,000,000 $33,000,000 $91,320 $182,640 $274,980 21 High Availability Design Cisco Secure PIX Firewall Cache Distributed Engine Director ISP 1 ISP 2 Customers Catalyst 6500 LocalDirector No single point of failure Redundant network devices Redundant network paths Protocol services for high availability (HSRP, STP, etc.) 22

QoS for E- Cisco Secure PIX Firewall Cache Distributed Engine Director ISP 1 ISP 2 LocalDirector Customers Catalyst 6500 Prioritize SSL connections over HTTP Edge routers Core switches 23 Multiple E- Sites Main Site Distributed Director ISP 1 ISP 2 Alternate Site NY HQ (LA) Server Backbone Load balancing across distributed sites Redirect users to nearest site Scalability and disaster recovery combined 24

E- Architecture Cisco Secure PIX Firewall Cache Distributed Engine Director ISP 1 ISP 2 LocalDirector Distributed Director Remote Site Catalyst 6500 25 Cisco E- Framework Architecture Co-lo Partner/ ISP-1 ISP-2 Cisco Secure IDS Cisco Router Cisco Secure Scanner Cisco LocalDirector Cisco DistributedDirector Si Si Cisco DistributedDirector Cisco Catalyst Switch Cisco Cache Engine /Application servers 26

Si Si Cisco E- Framework Architecture Si Si Cisco Catalyst Switch Cisco Secure PIX Firewall /Application servers Cisco Secure IDS Cisco Catalyst Switch Cisco Secure Scanner 27 Cisco E- Framework Architecture Co-lo Partner/ ISP-1 ISP-2 Cisco Secure IDS Cisco Router Cisco Secure Scanner Cisco LocalDirector Cisco DistributedDirector Cisco DistributedDirector Si Cisco Catalyst Switch HQ Cisco Cache Engine Cisco Secure PIX Firewall /Application servers Cisco Secure IDS Cisco Catalyst Switch Cisco Secure Scanner Async Console 28

Cisco Ecosystem Partners Cisco Powered Broadvision, I2, Interworld Microsoft, Oracle, Open Market Microsoft, Sony, Samsung, Hitachi, Panasonic KPMG, ENS, EDS, Telcordia, IBM Microsoft, Hewlett-Packard, IBM, Sun, EMC 29 E- Ecosystem Jointly tested and validated infrastructure blueprints Design recommendations Implementation guides Architecture center http://www.eecostructure.com 30

Next Steps Develop e-business strategy Align business goals to e-commerce goals Define requirements for scalability, security, and availability Work with Cisco and Cisco Ecosystem Partners for complete e-commerce solution Visit Cisco website for Quotient Test and e-commerce info: http://www.cisco.com/warp/public/750/indicator/quiz.html http://www.cisco.com/warp/public/779/largeent/issues/ecomm/ 31 Forecasts for Year 2000 U.S. online retail revenues will hit $38.8 billion. 4 U.S. business trade over the Net will skyrocket to $251 billion. 4 Sources: 1 International Data Corp., 2 Jupiter Communications, 3 Cyber Dialogue, 4 Forrester Research 28.4 million U.S. households will shop online. 4 The U.S. online population will reach 137 million, less than 50% of nation s population. 1 11 million U.S. households will make their first purchase online. 4 14 million new U.S. households will go online. 2 25% of U.S. adults will visit international sites on a monthly basis. 3 32

Other ers Sessions 2204 Introduction to Routing Protocols 2500 Introduction to Security 2800 Caching and Load Balancing Technologies 2801 Deploying Highly Available s 3103 ed Supply Chain Management 3104 Requirements for New World Customer Care 33 E- ing Session Thank You 34

Please Complete Your Evaluation Form Session 35 36