Tuesday 4 February 2020

Digital Green: Providing for those who provide for others

Cisco Prep, Cisco Guides, Cisco Tutorial and Material, Cisco Certification, Cisco Learning

Smallholder farmers produce more than 80 percent of the world’s food. But they also make up 80 percent of the world’s poorest people, which means they often lack the resources to grow their businesses. Digital Green, a Cisco social investment partner, is using technology to change this equation.

Cisco Prep, Cisco Guides, Cisco Tutorial and Material, Cisco Certification, Cisco Learning

The nonprofit began in 2008 with a vision of helping smallholder farmers improve agricultural practices and boost their incomes. They began by sharing information with farmers on how to increase their yields, producing thousands of locally relevant videos in more than 50 languages. But they realized that more needed to be done to boost farmer incomes. Just as important as growing food is having a place to sell it. That’s why Digital Green built the Loop app, which helps farmers aggregate their produce and get it to markets. It uses a learning algorithm to optimize vehicle routing so farmers get the best prices for their produce. With Loop, farmers can:

Cisco Prep, Cisco Guides, Cisco Tutorial and Material, Cisco Certification, Cisco Learning

Investment from Cisco makes this possible. Cisco was the first donor to provide dedicated funding to support Loop. Farmers saw a gross increase in income of 17 percent as a result of using Loop. Our latest grant will help Loop spin off into a separate social enterprise. Through the collective power of technology and grassroots-level partnerships, Digital Green and Cisco are helping farmers lift themselves out of poverty.

Digital Green is a Cisco partner in our social investment focus area of critical human needs and disaster relief, along with Destination: Home, Mercy Corps and many others. Our Critical Human Needs and Disaster Relief portfolio focuses on increasing access to essentials like water, food, and housing. We also invest in technologies that help people in crisis, from delivering humanitarian aid to providing relief after natural disasters.

Cisco’s research helps guide our grantmaking and related investments to make a meaningful impact. These investments in nonprofit partners enable them to use technology-based solutions to improve how they operate and reach underserved communities. And they support conditions for the communities they live in to thrive. Our approach is to invest in early-stage solutions. This is the stage where funding is most needed and where we can make the biggest difference. Funding from Cisco and the Cisco Foundation helps nonprofits apply technology to:

◉ Create innovative solutions targeting individual and community needs

◉ Implement proof-of-concept pilots to validate viability of solutions

◉ Improve the delivery, quality, efficiency, and effectiveness of their products and services

◉ Scale to reach more people

◉ Replicate to multiple geographies globally

◉ Validate social impact

◉ Make progress toward financial sustainability

◉ Use data for better decision-making

We also provide our nonprofit partners with ongoing consulting services, advisory support, and technical expertise in areas including:

◉ Governance and operational structure

◉ Organizational leadership capacity

◉ Business planning and strategy development

◉ Impact evaluation

◉ Financial sustainability planning

It is important to confirm that the solutions we invest in are making a difference. We work closely with the nonprofits we fund to measure their effectiveness and impact. This measurement also provides partners with insights on how to improve. We measure both breadth (number of people reached) and depth (the impact their programs are making). Depth is measured with a standard set of metrics for each of our three investment focus areas, as well as custom metrics specific to our partners’ social objectives. We also ensure that solutions serve communities that need it most. Grantees must validate that at least 65 percent of their programs’ participants are from underrepresented and vulnerable population groups. They also provide quarterly reports to share progress against targets that we agree upon, such as client satisfaction.

Cisco Prep, Cisco Guides, Cisco Tutorial and Material, Cisco Certification, Cisco Learning

Thursday 30 January 2020

Securing Industrial IoT

It’s hard to ignore the ubiquity of the internet of things (IoT). Even if you’re one of those holdouts that doesn’t own consumer IoT devices such as a smart speaker, internet-connected thermostat, or a smart watch, industrial IoT (IIoT) devices—a subset of the IoT landscape—are already playing a part in your daily life. From the delivery of water and electricity, to manufacturing, to entertainment such as amusement park rides, IIoT devices are part of more industries than not, and have been for some time. Gartner recently estimated that there were 4.8 billion IIoT assets in the world at the end of 2019, and expects that number will grow by 21 percent in 2020.

Cisco Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Guides

The biggest issue faced in many operational technology (OT) environments, which host IIoT assets, isn’t just this growth, but also dealing with older industrial control systems (ICS) that have sometimes been in operation as long as 30 years. Many of these assets have been connected to the network over the years, making them susceptible to attacks. These legacy devices were often deployed on flat networks, at a time when the need for security took a back seat to other priorities, such as high availability and performance.

The discovery of vulnerabilities in these systems doesn’t always mean that patches are, or even can be, rolled out to fix them. Patching many of these IIoT assets means taking them offline—something that’s not always an option with critical infrastructure or production lines that rely on high availability. So patches are often not applied, and vulnerabilities stack up as devices age, leaving attackers with a large swath of exploits to attempt in the pursuit of compromising IIoT assets.

And the number of vulnerabilities discovered in IIoT devices is growing, as is evident in research carried out by Cisco Talos’ Security Research Team, whose mission is to discover vulnerabilities before the bad guys do. During their look back at 2019, Talos pointed out that they published 87 advisories about vulnerabilities in IoT and ICS devices—by far the largest category for the year. In fact, there were 23 percent more advisories published in this space than there were for desktop operating systems, the second largest category, and historical mainstay targeted by attackers.

This isn’t all that surprising in a field that’s growing this fast. But it’s worth considering how adding new assets into a network, as well as securely maintaining the OT network where assets reside, presents new challenges and naturally increases the attack surface.

So, if you’re using IIoT assets in your business, what sorts of threats do you need to look out for? And how do you protect your devices?

Getting in


The good news is that most IIoT assets aren’t directly exposed to the internet, meaning attackers must rely on other methods to get to them. In essence, the same techniques used in other attacks are used to get to IIoT assets.

The most common vector for compromise—email—certainly applies here. An attacker can attempt to gather information about engineers, plant managers, and developers that have access to IIoT systems and specifically target them with phishing emails. Compromising a computer owned by any of these users can be the most direct path to compromising IIoT assets.

Unpatched systems, simple or default device passwords, and relaxed remote access policies for maintenance contractors all offer attackers avenues of approach. Weaknesses in any of these can provide ways for an attacker to move laterally and gain access.

The reality is that IIoT-specific threats are not that common of an occurrence. There are threats that have attacked general IoT devices en mass, such as Mirai and VPNFilter. And there are threats like Stuxnet, which specifically targeted PLCs. Of course such highly targeted threats are cause for concern. But it’s far more likely that an IIoT device will be compromised and reconfigured by an attacker than be compromised by a trojan or a worm.

Scorching the earth


Let’s say an attacker sets their sights on bringing a particular business to its knees. He or she begins by crafting an enticing phishing email with a malicious PDF and sends it to HR in the guise of a job application. The employee responsible for monitoring job enquiries opens the PDF, effectively compromising the computer.

The attacker works his or her way laterally through the network, monitoring network traffic and scanning compromised systems, looking for logins and authentication tokens. Without multi-factor authentication enabled for access, they encounter few issues in doing so. The attacker eventually manages to compromise a domain controller, where they deploy malware using a Group Policy Object (GPO), successfully compromising the entire IT network.

Due to poor segmentation, the attacker manages to eventually work his or her way to the OT network. Once in, the attacker performs reconnaissance, flagging the IIoT assets present. The attacker identifies vulnerable services in the assets, exploits them, and knocks them offline.

Production grinds to a halt and the business is effectively shut down.

Defense with an arm behind your back


So how do you defend your IIoT assets and the OT network as a whole against attacks, especially for high-availability assets that can’t readily be brought down to patch?

Network monitoring is often the most effective step you can take. However, it’s important to passively monitor the traffic when it comes to IIoT assets. Active monitoring, where traffic is generated and sent through the network specifically to observe its behavior, can result in an increased load on the network, causing disruptions to device performance and even causing them to fail. In contrast, passive scanning listens to the traffic, fingerprinting what it sees, rather than introducing new traffic into the OT environment.

Keeping a current inventory of assets on the network is also very important in protecting the IT and OT networks. Passive monitoring can help to identify assets on the network, including errant and rogue devices. With a comprehensive list of devices, you can create policies for asset groups.

It’s also very important to segment your networks. Having a complete asset inventory and policies in place will help when figuring out how to segment your IIoT assets and the OT network. While this may not prevent a determined attacker from crossing the boundaries between different areas of the network, it can slow them down, providing more time to respond in the case of an attack. Explore implementing zones and conduits as discussed in ISA99 and IEC 62443 within your organization.

However, it’s worth noting that many IIoT assets leverage broadcast and multicast network communications, where one or more devices will send traffic to all other devices on the network. This can pose a challenge when aggressively segmenting a network. To address this, having a complete inventory of assets on the network is important. Strong dataflow mapping is also helpful when it comes to knowing which assets are talking to each other and how they interact as a whole.

Patching IIoT assets as soon as possible after a vulnerability is discovered is highly recommended. But if it isn’t possible to take a device offline to patch, then visibility becomes critical. It’s important to know what assets you have and the network layout to identify what absolutely must be patched. It may also be worth exploring IIoT redundancy within your network, allowing you to take one device down while others pick up the load during maintenance cycles.

Cisco Prep, Cisco Tutorial and Material, Cisco Learning, Cisco Guides

Being able to detect IIoT traffic anomalies is also very helpful. Look for behavior that falls outside of what is expected, such as two IIoT assets talking to each other that shouldn’t be, unplanned firmware updates, unexpected configuration changes, or other anomalies.

Finally, threat hunting is a great way to look for and weed out threats within your OT environment. Proactively looking for bad actors doing bad things, building playbooks, and automating them will go a long way to improve your security posture.

Easing the burden


Protecting IIoT assets is arguably one of the more difficult tasks in security. There are a wide variety of devices, many of which operate in a very tailored manner and don’t respond well to disruption that could be caused by many security processes and procedures.

Fortunately, there are a number of Cisco Security products that can help.

◉ Cisco Cyber Vision gives OT teams and network managers full visibility into their industrial assets and application flows. Embedded in Cisco industrial network equipment, it decodes industrial protocols to map your OT network and detect process anomalies or unwanted asset modifications.

◉ Identity Services Engine leverages the asset inventory built by Cisco Cyber Vision to create dynamic security groups and automatically enforce segmentation using TrustSec.

◉ ISA3000 is a ruggedized industrial firewall appliance you can deploy in harsh environments to enforce zone segmentation, detect intrusions, and stop network threats.

◉ Stealthwatch is a security analytics solution that uses a combination of behavioral modeling, machine learning, and global threat intelligence to detect advanced threats. Integrated with Cisco Cyber Vision, this visibility extends deep within the IIoT infrastructure.

◉ AMP for Endpoints can be used to protect engineering workstations within the OT environment.

◉ Duo’s multi-factor authentication can be used to prevent an attacker from gaining access to systems on the network as a they attempt to move laterally.

◉ Cisco Email Security can detect targeted phishing emails aimed at IIoT operators and others, preventing malicious payloads from reaching their intended target.

Ultimately, a layered approach will provide the best security. For instance, Cisco Cyber Vision can automate visibility of industrial devices and secure operational processes. Integrated with Cisco’s security portfolio, it provides context for profiling of industrial devices in Stealthwatch, and maps communication patterns to define and enforce policy using granular segmentation via with ISE.

Wednesday 29 January 2020

The Not-So-New Role of the Engineer in Complex Change: Master of Transitions

Cisco Prep, Cisco Learning ,Cisco Tutorial and Material, Cisco Online Exam, Cisco Certification

The Age of Intelligence is here, and Cisco is in the midst of a transition — again. This transition is driven primarily not by AI and machine learning, but by the voices of our customers and their need to consume technology in new ways and digitally transform their businesses. While Cisco established itself in 1984 in the midst of a technology revolution, the need to continue evolving hasn’t slowed one bit.

Challenges Everywhere


In the 1980s, Cisco’s key product was the AGS Multi-Protocol Router, and alone it could solve a host of customer challenges. Today, our efforts to solve those challenges and provide the type of experience they demand has given way to multi-vendor and cross-architectural (multi-domain) solutions. These solutions are comprised of dozens of products and architectures across an array of companies.

The cloud has not alleviated the situation, as was promised early on. In reality, cloud has created additional complexity. Most customers are not only growing their business on-premises but also contending with the requirements of a hybrid-cloud environment. Interoperability between technologies and vendors adds yet another layer of challenges to be solved.

Security is paramount as no part of a corporate infrastructure can be left unprotected. The proliferation of personal devices into corporate IT also presents a new set of challenges. The mobile nature of today’s workforce requires wireless/mobility services that not only connect seamlessly, but also demand the same speed and reliability of hardwired devices. As corporate infrastructures continue to expand, the ability to manage multiple converged technology stacks has created even more complexity in the data center. The collision between software developers and network administrators creates challenges on how each side can complement each other to provide the best possible business solution for a customer or employer.

Clearly these are busy times! The questions I often hear from customers, are “This is crazy! Who can I trust to work with and figure this out? Who will put my best interests first and help me start down a path leading to my ultimate success?”

To make it work, you need people who thrive on complexity, problem-solving and change: the engineer.

Your Trusted Advisor: Systems Engineer


There has never been a better time to be a systems engineer (SE). With continuous change, it’s a good thing engineers thrive on complexity, and are comfortable being uncomfortable. Also, it’s a great thing that engineers at Cisco and our partners think about change in the context of customers and their ultimate experience. In fact, we hear from our customers who consistently note the Cisco SE as the individual they have the highest level of trust in to help them navigate these challenging waters. When customers are surveyed, they reference phrases like “put their interests first,” “honest/forthcoming,” and “Trusted Advisor.” When I speak live with customers it’s much of the same.

At Cisco within the global SE community we use a slogan to describe who we are, which I think captures things perfectly: “Masters of Transition since 1984.” That transition is alive 35 years later, and our systems engineering community is applying its skills very much as it did in the 1980s.

Have You Met Your Field Engineer?


While much of helping customers harness technology, and how it applies to their business, falls to the SE ranks, another group is becoming as critical to Cisco as the success of our customers. Field engineers (FE) have the deepest level of knowledge within technology disciplines across multiple vendors, help customers extract the value of the technology they’ve purchased, and work directly with customers to help train their employees to incorporate technology into the fabric of their work. The FE is the truest practitioner of technology expertise that exists within our industry. In short, if the FE isn’t successful then neither is the customer, partner, or Cisco. When customers ask, “who will see this entire project through with me”? I have a simple reply, “have you met your field engineer?”

Cisco Prep, Cisco Learning ,Cisco Tutorial and Material, Cisco Online Exam, Cisco Certification

Ultimately responsible for ensuring the customer is able to not only fully extract the value of the technology purchased, the FE also assures that customers are comfortable integrating it into their existing or new business. The FE is truly where the rubber hits the road, so to speak in terms of customer receiving — and benefiting — from the technology they have acquired. With this responsibility it’s no wonder why Cisco is investing significantly in our reseller and partner FE community so that our customers are not just purchasing technology, they are activating, adopting and benefiting.

Driving Success Forward


Threats are everywhere. Outages can potentially cost millions of dollars. Change windows are harder to secure. Technology updates bombard organizations non-stop on a daily basis. Your engineering teams carry the full weight and burden of how business can (and should) realize the benefits of Cisco technology.

With complexity at its highest, pace of change at its quickest, and threats lurking around every corner, this is without a doubt a new Age of Intelligence, and engineers can lead the way forward.

Tuesday 28 January 2020

2020 is Calling: Cisco UCM Cloud Momentum and Benefits

In a brand-new year where the market will continue to see calling as a linchpin of and strategic differentiator for enterprise digital transformation, Cisco is taking a unique approach. While other collaboration vendors are pushing their customers to the cloud without a viable migration path, Cisco is continuing to invest in our on-premise architecture while migrating our market–leading solutions to the cloud.

Read More: 210-250: Understanding Cisco Cybersecurity Fundamentals (SECFND)


The good news for Cisco on-premises customers is that traveling the path to the cloud (or to a hybrid state) does not have to take too long or be too treacherous. Cisco Unified Communications Manager Cloud (UCM Cloud) is the quickest, most natural migration path to cloud calling for customers who are looking to:

◉ Minimize disruptions with familiar user experiences

◉ Enjoy the latest UCM features

◉ Re-use existing Cisco endpoints and infrastructure

◉ Continue with existing PSTN service agreements and gateways

◉ Simplify procurement with a Cisco Collaboration Flex Plan

◉ Take advantage of generous trade-in incentives and migration programs

The UCM Cloud team is excited to communicate that we have expanded our global footprint, and our European data centers are now live, and we are actively working onboarding partners in the region. That is why our presence this year at Cisco Live Barcelona will focus on continuing to drive momentum as we expand globally.

Digital Business Transformation, Cisco Cloud, Collaboration, Cisco Prep, Cisco Guides, Cisco Study Material

Global Cloud Calling Momentum


Since the August Launch of UCM Cloud, we have seen tremendous global momentum with the expansion of the UCM Cloud service to Webex data centers in North America and Europe, with Asia Pacific scheduled to come online in Q1 of this calendar year. Our customers across the world can now buy their chosen service in their contract country with localization options that match our on-premises UC Manager product. These localized options include support for phone and gateway tones in 82 countries and a self–care portal in 50 languages and clients in more than 30 languages simplifying the cloud migration process.

The Benefits of Cisco UCM Cloud Calling


A recent Gartner Unified Communications forecast suggests that by 2023 there will be 167 million cloud calling and collaboration users on the planet, nearly twice as many as there are today.1

Moving enterprise calling workloads to the cloud can be a daunting prospect for organizations where daily business relies on highly customized collaboration workflows. Over the last several months, our customers have told us they need a migration path to the cloud without disrupting their business–critical day-to-day activities. These customers need the same features, functionality, third-party integrations, and customizations they have been using for years, and the desire to continue to use their existing voice and video endpoints to extend their return on investment for these assets. 

The need for a highly customizable cloud calling platform to maintain functionality is one of many factors that is driving Cisco enterprise customers to our UCM Cloud calling solution.  Our enterprise customers are not alone in this request. Recent research done by MZA shows that a majority of organizations with more than 1,000 seats are interested in a private instance cloud calling solution.

The Advantages of Cisco UCM Cloud


Addressing the needs of our customers looking for a highly customizable calling platform was one of the primary drivers behind the development of UCM Cloud. The service offers the same familiar, award-winning Cisco Unified Communications Manager (CUCM) features and user experience providing an ideal migration path to the cloud for enterprise customers with on-premise UC Manager  deployments.

 With UCM Cloud You Get: 

◉ A dedicated calling application instance hosted and operated by Cisco in Cisco Webex Data Centers

◉ A customizable calling platform with all of your favorite Cisco UC Manager capabilities along with an API strategy that enables deep third-party application integrations

◉ A large-scale, flexible architecture that can adapt quickly to new growth requirements

◉ A robust, secure platform, with a FedRAMP authorized version, cloud-enabled Cisco Unified Survivable Remote Site Telephony (SRST) features, e911 capabilities, and other key UC Manager enterprise security modalities embedded within the platform

◉ A familiar user experience that speeds migration to the cloud and bypasses the need for employee re-training

◉ A unified client for calling, messaging, meetings and team collaboration that is usable across all device types

◉ Compatibility with Cisco’s full portfolio of phones, gateways, and video devices

◉ Hybrid deployment capabilities as UCM Cloud represents the quickest path to the cloud for Cisco on-premise customers

How Cisco UCM Cloud and the Webex Single Platform Advantage Fit


UCM Cloud is a strategic component to the Webex Single Platform Advantage, helping provide Cisco customers with a cloud calling option that manages security and streamlines risk, improves scalability, and reduces costs—well–known challenges for today’s business and IT leaders. We have integrated UCM Cloud with the Webex Platform, connecting services and integrating experiences to deliver consistency regardless of which workload—calling, meetings, messaging, devices, or contact center—you use or where—desktop, mobile, or devices—you collaborate. Our single platform approach is grounded with a focus on enterprise–class security, IT control, and visibility, which helps our customers solve their digital transformation challenges.  

Monday 27 January 2020

Modeling an inclusive digital future

We live in a digital world. Digital technologies are advancing at a rapid pace, connecting people around the world and creating new and exciting opportunities. More than any time in human history, people have greater access to knowledge, services and resources as a result of technological advancements. The impact of automation, artificial intelligence, and the Internet of Things (IoT) is felt almost everywhere, in all countries, industries, and everyday life. However, while the impact of digitization is widespread, the benefits it yields are distributed unevenly. It is important to understand a country’s digital readiness to help create a more inclusive future for all, which is the objective of Cisco’s 2019 Global Digital Readiness Index.

To uncover key insights and build our understanding on what it means for a country to be digitally ready, a holistic model was created that includes components beyond technology, such as basic needs, human capital development, and the business and start-up environment. Although having access to technology and the infrastructure to support digital technologies is critical, if individuals’ basic needs are not met (e.g. access to clean drinking water or lack of education or job opportunities), a country cannot fully take advantage of digital opportunities. This holistic model allows for an understanding of a country’s level of digital readiness and what interventions and investments could help countries advance in their readiness.

In this second iteration of the study, it was found that globally, countries’ scores vary on digital readiness with three stages emerging: Activate, Accelerate, and Amplify. No country scored perfectly. For countries in the lower stage of digital readiness (Activate), a focus on basic needs and human capital development is especially important. As technology is consistently advancing, there is a continuous need for developing skilled talent with the most current employable skills for the job market and creating new digital innovations. In addition to these foundational interventions, countries in the middle stage of digital readiness (Accelerate) would also benefit from investing in enhancing the ease of doing business. The study revealed that, no matter the stage of digital readiness, human capital development is essential to build a workforce capable of utilizing and creating technology on a continuous basis.

Cisco Prep, Cisco Tutorials and Material, Cisco Learning, Cisco Certification

At Cisco, we believe it is important to contribute research to help the continuing dialogue on technology’s future impact. We hope to serve as a catalyst for driving an inclusive digital economy. To do so, we conduct research to gain a better understanding of what it means to be digitally ready and what would be the most beneficial to help individuals and countries thrive in the digital world. We use these insights to ensure the relevance of our key Corporate Social Responsibility (CSR) investments, such as our Cisco Networking Academy program, where over two million students worldwide gain foundational digital and entrepreneurial skills that improve their career prospects and help fill global demand for technology professionals.

To help take advantage of the opportunities technology can bring, we are working toward empowering global problem solvers – individuals who are innovators and entrepreneurs – who will be key to fueling an inclusive digital economy. Jobs of the future are not fully understood and will change constantly, but individuals who learn innovation and entrepreneurship skills using technology to solve problems will be prepared no matter what the future holds.

We can use research to design our programs and investments to develop and support global problem solvers who apply digital solutions to address social problems and foster economic development. We have a bold goal to positively impact 1 billion people by 2025 through digital solutions.

If we empower global problem solvers and prepare them with the right skills, we can help them participate in the global economy and create economic opportunity for all.

Sunday 26 January 2020

An Update on the Evolving Cisco and SAP Strategic Partnership

As Cisco’s SAP ambassador, I’m often asked, “Tell me about the Cisco and SAP partnership.” Many may not know, but in 2019 we celebrated twenty years of Cisco and SAP working strategically together—always with the objective of benefiting our mutual customers. Innovation has been an intense focus for the partnership, which is why, for example, Cisco became a founding sponsor of the SAP co-innovation lab in 2014.

Cisco Partners, Cisco DNA Center, Cisco Container Platform, Cisco Prep, Cisco Study Material

Today, the Cisco and SAP partnership touches many business units at Cisco; what began with optimizing Cisco Data Center products to run SAP software has evolved to include other strategic areas such as Internet of Things (IoT), cloud computing, big data processing, AI/ML, and collaboration.

SAP Data Hub on Cisco Container Platform


As an example of software co-innovation, Cisco Container Platform (CCP) is certified for the SAP Data Hub and includes support for use cases such as hybrid cloud big data processing. Many SAP Data Hub customers want to run in hybrid cloud environments to leverage cloud-based services, while also keeping some data on premises to meet security and governance requirements.

SAP Data Hub is SAP’s first micro services container-based application, and it enables users to orchestrate, aggregate, visualize, and generate insights from across their entire data landscape. SAP Data Hub runs anywhere Kubernetes runs.

Unfortunately, running Kubernetes on premises has its challenges. For instance, IT must  answer questions about how to manage and support Kubernetes. In addition, it’s challenging to connect the private and public cloud environments and complicated to manage user access and authorizations across multiple environments.

The integration of SAP Data Hub with CCP addresses these challenges. CCP is a production-ready Kubernetes container management platform based on 100 percent upstream Kubernetes and delivered with Cisco enterprise-class Technical Assistance Center (TAC) support. It reduces the complexity of configuring, deploying, securing, scaling, and managing containers via automation. CCP works across on-premises and public cloud environments.

The Cisco and SAP teams are working closely to bring the next iteration  of SAP’s multicloud strategy for on-premises deployments—SAP Data Intelligence, which marries SAP Data Hub to AI/ML—to fruition.

AppDynamics monitors SAP environments


Cisco Partners, Cisco DNA Center, Cisco Container Platform, Cisco Prep, Cisco Study Material
Cisco has enhanced AppDynamics, its application performance monitoring product, to monitor SAP environments. This engineering effort includes giving AppDynamics code- level visibility into SAP ABAP, which is the primary programming language for SAP applications.

This new capability provides direct hooks that enable AppDynamics to measure the business process performance of SAP applications. And though SAP has its own monitoring solution, AppDynamics enables SAP customers to monitor their business processes across SAP and non-SAP solutions.

Monitoring is of special importance to SAP customers because their systems often consist of SAP and non-SAP components. For example, at a minimum, an online retail e-commerce system likely consists of a web server connected to an SAP ERP system, and slow checkout can potentially drive customers away. Unfortunately, it is time-consuming and difficult for engineering teams to diagnose where in the stack a performance issue is occurring.

Cisco DNA spaces


Everyone is talking about IoT and digital transformation. However, a big challenge in deploying an IoT strategy is the need to put sensors everywhere, which represents a huge investment of capital, time and resources.

As a leading network provider, Cisco can help customers meet this challenge, because,  in many cases, a wireless network is already in place. A wireless access point not only acts as a transmission device, but it can also sense things if enabled with Cisco DNA Spaces. For instance, an access point can track how many mobile phones are connected, for how long, and where they are located at all points in time. By combining geo-location information with enterprise data, businesses get closer to achieving the IoT promise of utilizing data from things to ultimately make better decisions.

Consider this scenario: the owner/operator of a shopping mall wants to know not only quantity of traffic but also where visitors to the mall go. By combining this data with SAP ERP data such as lease fees and analyzing it, the owner/operator can decide upon fair lease prices for shops located in lower- versus higher-traffic areas.

Through Cisco and SAP co-engineering, the rich on-location people and things data provided by Cisco DNA Spaces is now integrated with SAP software, enabling our mutual customers to gain additional insights into what’s happening in their businesses.

Cisco Data Center solutions for SAP


Finally, Cisco UCS-based converged infrastructure solutions—which were launched over a decade ago—are at the heart of the infrastructure running many SAP workloads today. These solutions blend secure connectivity, programmable computing, multicloud orchestration, and cloud-based management with operational analytics for our customers’ SAP data centers.

We continue to innovate around these data center solutions to support evolving use cases such as providing support for machine learning applications. Cisco Data Center solutions, for example, have now integrated NVIDIA GPUs and are certified to support Intel® Optane, which enables persistent memory, larger memory pools, faster caching, and faster storage.

The next twenty years …


As Cisco’s SAP ambassador, I’ve seen over and over again how Cisco and SAP’s portfolios complement each other. For example, a key SAP mission is to help its customers become intelligent enterprises, which requires robust connectivity at all customer touchpoints. This mission, of course, meshes with Cisco’s core competency as the world’s leading network provider.

As we continue to innovate, Cisco and SAP will continue our laser focus on co-engineering innovations that deliver the value our mutual customers require in their evolving business environments.

Saturday 25 January 2020

Service Mesh for Network Engineers

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

Learning never ends, and that’s never been truer for the trusty network engineer. Of late Network Engineers have been moving up the stack, changing the way we deliver network services, becoming programmatic and using new tooling.

A not so scientific graph of what network engineers need to be aware of in 2020

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

The driving force behind these changes is the evolution of application architectures. In the era of modular development, applications are now collections of loosely coupled microservices, independently deployable, each potentially developed and managed by a separate small team. This enables rapid and frequent change, deploying services to where it makes most sense (e.g. Data Centre, public clouds or Edge). At the same time, Kubernetes (K8s) is quickly becoming the de facto platform upon which to deploy microservices.

What does this mean for the networker engineer? Well, routing, load balancing and security have been the staple of many over the years. It’s stuff engineers know very well and are very good at. But these capabilities are now appearing in some new abstractions within the application delivery stack.

For example, K8s implements its own networking model to meet the specific requirements of the k8s architecture. Included in this model are network policies, routing pod to pod, node to node, in and out of clusters, security and load balancing. Many of these networking functions can be delivered within K8s via a Container Network Interface (CNI) like Nuage or Flannel. Alternatively, you could leverage a lower level networking abstraction such as the Cisco Application Centric Infrastructure (ACI), benefitting from using one common network fabric for bare metal, virtual machines and containers.

As K8s is a container orchestrator, designed for creating clusters and hosting pods, its networking model meets exactly those needs. However, K8s is not designed to solve the complexity of microservices networking. Additional developer tooling for microservices such as failure recovery, circuit breakers and end to end visibility is often embedded in code to address those aspects, adding significant development overhead.

Enter stage left service mesh.

“The term service mesh is used to describe the network of microservices that make up such applications and the interactions between them. As a service mesh grows in size and complexity, it can become harder to understand and manage. Its requirements can include discovery, load balancing, failure recovery, metrics, and monitoring. A service mesh also often has more complex operational requirements, like A/B testing, canary rollouts, rate limiting, access control, and end-to-end authentication”

The above poses the question: is a service mesh a network layer? Well… Kind of. The service mesh ensures that communication between different services that live in containers is reliable and secure. It is implemented as its own infrastructure layer but, unlike K8s, it is aware of the application. Some of the capabilities it delivers to the application are recognisable network functions such as traffic management and load balancing, but these are executed at the microservices layer, and need that intimate knowledge of the application and its constituent services. Equally, the service mesh relies on lower level abstractions to deliver network functions as well.

Service mesh networking vs K8s networking


To compare the capabilities of k8s and service mesh let’s look at the example of a canary deployment. The idea behind a canary deployment is that you can introduce a new version of your code into production and send a proportion of users to the new version while the rest remain on the current version. So, let’s say we send 20% of users to our v2 canary deployment and leave the other 80% on v1.

You can achieve this with k8s but requires some hand cranking. It would require you to create your new canary deployment in proportion to what already exists. For example, if you have 5 pods and want 20% to go to the V2 canary, you need 4 pods running v1 and 1 pod running V2. The Ingress load balancing will distribute load evenly across all 5 pods and you achieve your 80/20 distribution.

Canary Deployments with K8s and Service Mesh

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

With service mesh this is much easier. Because the service mesh is working at the microservices network layer you simply create policies to distribute traffic across your available pods. As it is application-aware, it understands which pods are V1 and which pods the V2 canaries and will distribute traffic accordingly. If you only had two pods, V1 and V2, it would still distribute the traffic with the 80/20 policy.

In terms of comparing them, we can think of as K8s provides container tooling whereas service mesh provides microservices tooling. They are not competitive. They complement each other.

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

Looking at the overall stack, we can see that there are now four different layers that can deliver specific networking functions – and you might need all of them.

Abstractions and more abstractions

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

How Does a Service Mesh Work?


There are a number of service mesh options in the market right now. Istio from Google probably gets most the headlines but there are many other credible service meshes such as Linkerd, Envoy, and Conduit.

Istio Control Plane and Sidecar Proxies

Cisco Online Exam, Cisco Prep, Cisco Tutorial and Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Learning

Typically, a service mesh is implemented using sidecar proxies. These are just additional containers (yellow in the diagram above) that proxy all connections to the containers where our services live (blue in the diagram above). A control plane programs the sidecars with policy to determine exactly how the traffic is managed around the cluster, secures connections between containers and provides deep insights into application performance. (We will have some follow-up blog posts going under the service mesh covers in the coming weeks).

Ok. Great stuff. But what does this mean for the network engineer?


Many of the service mesh features will be familiar concepts as a network engineer. So, you can probably see why it’s important for network teams to have an understanding of what a service mesh is, and how, why and where these different capabilities are delivered in our stack. Chances are, you may know the team that is responsible for the service mesh, you may be in that team, or end up being the team that is responsible for the service mesh.

Delivering microservices works great in an ideal world of greenfields and unicorns, but the reality is that most don’t have that luxury, with microservices being deployed alongside or integrated to existing applications, data, infrastructure stacks and operational models. Even with a service mesh, delivering microservices in a hybrid fashion across your data centre and public cloud can get mighty complex. It’s imperative that network engineers understand this new service mesh abstraction, what it means to your day job, how it makes you relevant and part of the conversation, and perhaps it spells great opportunity.

If you want to learn more then there are a number of service mesh sessions at CiscoLive Barcelona.

Service Mesh for Network Engineers – DEVNET – 1697

Understanding Istio Service Mesh on Kubernetes – DEVNET-2022

DevNet Workshop: Let’s Play with Istio – DEVWKS-2814

But..why do I need a Service mesh? – BRKCLD-2429