Connected Experiences 2017
Bio 7 years at Cisco Meraki Security / SD-WAN / Analytics / SP Launched MX in 2011 500M firewalls and counting Before, PM @ Dell (Wyse)
Landscape Connected Experiences
Applications and Users Billions of mobile devices HD video and rich media New business opportunities Integrated mobility management Layer 7 application shaping Analytics and user engagement Connected Experiences
Locations 80% More Digital Displays Cloud/SaaS Apps Users Of employee and customers are served in branch offices* IoT Thin Client Apps More Devices 73% Growth in in mobile devices from 2014-2018** Omni-channel Experience Branch Office Mobility Remote Experts More Apps 20-50% Increase in Enterprise bandwidth per year through 2018** HD Video/ Training More Risk 30% Guest Wi-Fi Of advanced threats will target branch offices by 2016 (up from 5%) ** *Tech Target, Branch Office Growth Demands New Devices, 2013 **US The Census Bureau of the Department of Commerce, 2015 rce: Gartner: How to Cost-Justify WAN Optimization
Education High-density wireless without the high Maintenance Keep students and faculty safe with options ranging from perimeter network security to physical campus security Built-in tools to help deliver Best-in-class IT Powerful APIs to make creating student experiences a reality
Hospitality High-density / high-throughput network access Security for guests and business apps Built-in tools for a high-quality experience with lean IT Powerful APIs for personalized services
Retail High-quality guest wireless Security for payment safety Built-in tools for a highly-available connectivity Powerful APIs for marketing / business integration
Solutions
Enhance Connectivity With SD-WAN OpEx savings: Apps Use low-cost Internet Maintain MPLS-like reliability Improved bandwidth: Internet Internet as WAN offers cheaper bandwidth Application control Branch edge Uplinks intelligently assigned Ease of deployment, ease of use: Increasing WAN costs over MPLS Bandwidth congestion Complexity Deep visibility and control Highly scalable architecture Secure connectivity 10
Deliver Security With Cisco Talos threat intelligence 1.5 million malware samples / day 600 billion email messages / day Over 250 full time threat researchers Internet-wide scanning 16 billion web requests / day Millions of telemetry agents 4 global data centers Telemetry Honeypots Over 100 threat intelligence partners Internal vulnerability discovery Open source communities Over 1100 threat traps
Deliver Memorable Guest Experiences With Meraki Wireless Networking Leverage Location Analytics for actionable insights about guest behavior Seamlessly integrate with 3 rd -party apps providing location-aware experiences Personalized, relevant engagement + = Included for free with all Meraki APs No additional license required Dedicated Bluetooth BLE radio Advertise & Scan Meraki APIs developers.meraki.com
Provide Business Impact With Data and Analytics Branded Social WiFi Audience Analytics Proximity Campaigns Business Outcomes 23% more time 80% more return to 3x more opt-ins 15% redeem offers spent in-venue venue for offers on average*
Meraki
Who we are and what we do NETWORKING IS COMPLICATED. WE RE MAKING IT EASIER, FASTER, AND SMARTER. Our products are used in over 800,000 networks worldwide; you ll find them in classrooms, coffee shops, hospitals, and hotel rooms. Better networking means that businesses run more smoothly, and more people have reliable access to the information they need. A complete, powerful, and intuitive cloud-managed IT solution. Wireless Security Switching Communications Enterprise Mobility Security Cameras
We Simplify IT Built-in wired splash pages Cisco Advanced Malware Protection With the Meraki Fullstack Anomaly detection Integrated port security MX Security Appliance Save time with topology, built-in alerting & cable testing! MS Switch No WLAN controllers Bluetooth BLE without batteries No Network Video Controllers (NVRs) No Video Management Software (VMS) MR Access Point Systems Manager Enterprise Mobility Management Deploy and control applications and content Control what users can do with managed devices MC IP Phone MV Security Camera No phone-specific switches No PBX
Meraki full stack End-to-end visibility & control End-to-end reporting & analytics Automatic network topology mapping Sentry policies for granular control
Questions
Thank you