Cisco Analytics e-Book
This document gives an overview of Cisco Analytics.
Harness your network data to delight your customers, improve business performance and protect your organisation.
Data is King
Hello! And welcome…
How are you tapping into the huge amount of information that flows through your organisation, every day, every second, every microsecond?
Businesses are waking up to the power analytics can bring to their organisation, but they might be missing a trick…
Sure, you could be using some great analytics software that throws some useful insights your way.
But does it really give you everything you could know as meaningful insights. And the tools to act on it?
Put your data to work
Did you know your infrastructure could be doing all the legwork for you? Capturing and acting on analytics insights.
With a Cisco Digital Network Architecture (Cisco DNA) now your network is not just a tool for connectivity, it's also a tool for collecting and acting on data.
Pretty exciting, right? With Cisco DNA you have the potential to get end-to-end visibility of your network, harness those insights and turn them into meaningful actions.
Which means you can unlock all the potential of your network data.
It requires a shift in mindset, but over the course of this e-book we’ll be exploring the three main areas of Cisco Analytics capabilities – all of which are designed for you to get the most out of your data.
So not only could you harness the power of your existing infrastructure, you can also get each of these uses all under one-roof. Pretty neat!
Customer and workplace experience
Get closer to your customers through analytics. By understanding what your customers want through real-time analytics, improve their experience and get closer to those you sell to. Cisco CMX has got it covered for you.
Understand everything that’s happening within your infrastructure, and then act on it. This makes you more flexible, more reactive, more agile. Find out how Cisco Network Analysis Module can help.
Detect where hidden threats are coming from, and stop attacks before they happen. Using the network as a sensor, get the upper hand against attackers.
Want to know more? Read on to discover the power of network analytics that you can harness with Cisco DNA.
Analytics for customer and workplace experience
Put data at the heart of your decision-making
Enhance customer and workplace experiences
Want to understand your customers better? Or improve your workforce experience?
Analytics lets you use the intelligence in your wireless network to better inform decision-making.
With Connected Mobile Experience (CMX) you can gain analytics insights to learn how visitors behave on site. Which can guide your business decisions to enable you to optimise experiences and maximise utilisation.
You can also engage on a more personal level by delivering the apps and information your customers want.
Enhance customer experiences
Today more than ever customers expect more mobile, immersive, and personalized experiences.
Cisco Connected Mobile Experiences (CMX) is a smart Wi-Fi solution that you can use to give patrons and guests the convenience of Wi-Fi connectivity while you learn how, where, and when they move through your facility.
Coupled with Cisco Enterprise Mobility Services Platform (EMSP) you can quickly create and deploy experiences that engage people on their mobile devices in your venue. So you can build stronger customer connections, implement new business models, and increase revenue opportunities.
– Blandine Charvériat-Louis, Chief Marketing Officer, Altarea Commerceote"
Three Key Features
1. Cisco CMX Analytics.
Translate customer and guest location data into a format that’s easily displayed on charts. See how visitors move through your venue, average time spent, new visitors versus repeat visitors, and more.
Determine where to position products or services based on historic and dynamic dwell time, adjust floor layouts to better serve customers given device density, and staff service locations according to traffic and time of day.
Figure 1. Cisco CMX Analytics Report Showing Detailed Traffic Patterns, Visitor Data, and Dwell Times
2. Cisco CMX Engage
Build new apps that incorporate the data you gain through Cisco CMX. If you have this capability in-house, you can use either an API or an SDK:
- Use our open API to gain location-based and Wi-Fi network data to build a broad range of applications.
- Add Wi-Fi-based indoor navigation with push notification and auto-launch capabilities to mobile apps.
- Deliver experiences via native, web, or hybrid mobile applications in real time.
3. Cisco CMX Connect
Bring visitors onto your guest Wi-Fi network simply and easily. Customize your login page with graphics and ads and scale to thousands of users. So you can deliver welcoming experiences keyed to where customers are in your venue.
In addition, you can collect information about customers with customisable forms, and integrate advertising to help monetize your Wi-Fi infrastructure.
Figure 2. CMX Connect Onboards Customers and Visitors onto the Local Wi-Fi Network
Enrich customer experiences further
Create mobile apps that are tightly integrated with your network infrastructure and back-end systems.
- Enable mobile experiences with a cloud-based, drag-and-drop interface using prebuilt modules.
- Protect your investments in your existing mobile apps.
- Use ready-to-go solutions, specific to your industry, to create engaging mobile experiences in minutes.
- Tap into your strong network security and compliance services to securely manage mobile devices and apps.
Adaptors enable you to interface with Cisco CMX and Cisco wireless LAN controllers.
So you can reduce development time while greatly simplifying deployment and management of mobile experiences to accelerate your digital business transformation.
– George Jonasz, Network Manager, Natural History Museum
Get CMX in the Cloud with Meraki
CMX is built-in to Cisco Meraki APs with no additional cost or complexity. Data is automatically reported in the dashboard, revealing visitor traffic trends, dwell time, and new vs. repeat visitor loyalty.
Including integrated Bluetooth technology, automated inventory scanning, and compatible with overlay Beacon systems for micro–location mapping and immediate zone beaconing.
Feed data into custom applications in real-time with cloud-based APIs. Integrate with back-end CRM, drive in-store customer engagement, or provide alerts to staff.
Optimise your workplace
Harness the power of network analytics to understand your true workspace utilization and find opportunities for optimisation.
So that you can create workspaces that meet the continually changing needs of your employees. And gain a competitive edge with a more effective workplace.
It is estimated that as much as 50% of office space is underutilized. And that adopting alternative worplace programs and job flexibility is critical in order to attract and retain top talent.
We enable you to use your network analytics to bring actionable insight to your office space. So you can make decisions that have impact now and are future-ready.
How it works
Get a continual view of your space needs to support your company growth, by evaluating the analytics available in your network.
By leveraging the analytics available on your network you can do scenario modeling to get real-time, granular space utilization data to explore options when planning spaces. Get insight into the who, when and where of how groups work together and match meeting room resources to real life workplace needs.
Find out areas of underutilization, get data driven learning about repurposing your office space to better match the way your teams work. And get workplace strategy and technology implementation recommendations based on your specific needs and goals.
As well as cost savings from downsizing, employee satisfaction and workplace performance can be improved.
With data driven insighted wasted space can be eliminated, office flow can be improved, and office space utilization can be optimised.
– James Sandell, Group IT Delivery Director, RSA
Together or individually, these solutions deliver optimized spaces that enable business growth through:
- Identifying and eliminating unneeded space to achieve cost savings from reduced office space overheads.
- Ensuring there is enough of the right spaces for your teams to get their jobs done and to foster employee collaboration
- Leveraging alternative workplace programs and job flexibility to attract and retain top talent
- Improving worker satisfaction through the right workplace strategies to increase employee productivity
- Reinvesting in higher quality and/or more strategically located offices
More ways to capitalize on CMX
Here are some examples of how CMX is already making a real difference across a wide range of businesses and organisations.
Greet your patients on their mobile when they arrive. Use automated check-in to help reduce wait times and notify extended care teams when a patient arrives. Then provide indoor navigation to consultant rooms and wards and deliver reminders and prescription-ready notifications to patients as they depart.
Understand where customers come from and where they go, to improve your insights and planning. Greet customers on their mobile devices as they enter your store or centre and then push location-sensitive offers and prioritize advertising.
Offer automatic check-in upon arrival, deliver special offers while your guests are at your venue, provide navigation to rooms and facilities, and understand guest foot traffic for optimal planning.
Let students use location-enabled class schedules and directions to get to class, understand student foot traffic for class assignment and study area planning. Determine student congregation points to assess wireless access point coverage.
Push information about delays and platform or gate changes and provide navigation to the gate, platform, or terminal. Advertise store, restaurant, and other facilities.
Improve business performance with insights
Get to know your network
The Cisco network analytics deliver pervasive visibility to help you gain better control. Learn who is using your network, what applications are running on it, and how they are performing.
The Cisco Prime Virtual NAM (vNAM) offers massive deployment flexibility. It brings application visibility and network analytics to more places in the network than ever before—physical, virtual, and cloud.
On top of this, Cisco's Netflow can increase operational agility, so you can rapidly respond to new business demands while maintaining an application experience that delights end-users.
Increasing Importance of Network Awareness
A more granular understanding of how bandwidth is being used offers many benefits. Packet and byte interface counters are of course useful. But understanding which IP addresses are the source and destination of traffic as well as which applications are generating the traffic is invaluable.
NetFlow Based Network Awareness
The ability to characterise IP traffic to understand how and where it flows is critical for network availability, performance and troubleshooting. Monitoring IP traffic flows facilitates more accurate capacity planning and ensures that resources are used appropriately in support of organisational goals.
It helps IT determine where to apply Quality of Service (QoS), optimise resource usage. And it plays a vital role in network security to detect Denial-of-Service (DoS) attacks, network-propagated worms, and other undesirable network events.
NetFlow provides individual packet inspection. So that you have a true picture of network activity, rather than sporadic snapshots that may miss critical events.
"The ability to characterise traffic on the network, both for capacity planning and anomaly detection, will become even more critical."
Roland Dobbins, Cisco IT Network Engineer.
Improve network operations with insights
Get multi-layered visibility into your network with Cisco Network Awareness Module and Netflow. Gain insights from the analytics inherent in your network to optimise network resources, troubleshoot performance issues and deliver consistent performance levels.
So that you can:
- Speed the deployment and improve the performance of business-critical applications
- Accelerate problem resolution with quick access to critical network information
- Validate use of control and optimization mechanisms, namely Differentiated Services
- Extend visibility into virtual and cloud environments
- Assess the impact of changes, such as server consolidation and VM migration, on performance
See comprehensive traffic statistics, application, voice, and video performance metrics through easy to manage interactive dashboards with intuitive workflows, contextual navigation, and one-click captures.
The insightful packet captures, advanced filters, and error scan enables detailed troubleshooting.
Enable faster troubleshooting and reduce network downtime by visually displaying every element of the network path from your source to your destination with Cisco Path Trace.
Leveraging the insights enables you to:
- Enhance operational efficiency with rapid problem resolution and efficient use of network resources
- Improve service levels with consistent performance visibility across the network
- Lower total cost of ownership with a choice of cost-effective form factors
– Brad Trankina, assistant director of technology at Human Kinetics
Deploy in the cloud with a virtual appliance to monitor hosted workloads at remote sites to characterise the end-user experience, or just about anywhere in the network to eliminate blind spots.
Getting to know your network
Using Cisco's Netflow you can deliver mission critical, performance sensitive services and applications.
NetFlow is an embedded instrumentation within Cisco IOS Software to characterise network operation. NetFlow gives you visibility into the network - an indispensable tool for IT professionals.
See how Backcountry have benefited from harnessing network analytics
Truly understand who, what, when, where, and how network traffic is flowing to improve business process and get an audit trail of how the network is utilised.
Harnessing this information will enable you to lower costs and allows efficient operation of the network. This also drives higher business revenues by better utilisation of the network infrastructure.
NetFlow can be used by Enterprises, Small and Medium-sized Businesses (SMBs), and Channel Partners to meet critical network challenges.
With this information NetFlow faciliates solutions to many common problems that you may face in managing your network:
Harness the power of data to protect your organisation
Harness Analytics for Security
Go beyond conventional threat detection and harness the insights from network analytics with Cisco Stealthwatch.
On top of this get contextual intelligence and enhanced visibility of network activities with Cisco Identity Services Engine (ISE).
Plus with Cisco TrustSec these insights can be used to identify and limit the spread of suspicious activity such as potential malware activity across your network.
All so you can meet compliance goals with ease.
Cisco Stealthwatch goes beyond conventional threat detection and harnesses the power of NetFlow for security. It enables you to get advanced network visibility and provides you with network protection. You see everything happening across your network and data centre and you can uncover attacks that bypass the perimeter and infiltrate your internal environment.
You get visibility and security intelligence across the extended enterprise and the entire attack continuum. That means before, during, and after an attack. It also continuously monitors your network interior, where sophisticated attackers often lurk undetected, providing you with:
- Real-time threat detection
- Incident response and forensics
- Network segmentation
- Network performance and capacity planning
- Regulatory compliance
Extended Network Visibility
Stealthwatch ingests and conducts proprietary analytics on NetFlow data from the network infrastructure. It uncovers critical details on network traffic, including:
- Source and destination IP addresses
- Volumes of traffic being transmitted
- User, device, and application data
You gain in-depth insight into everything going on across the network and can quickly baseline normal behavior. It's then much easier to pinpoint when something looks suspicious. Add-on capabilities like the Proxy License and Cloud License to get even more layers of visibility and context.
It can identify malware, distributed denial-of-service (DDoS) attacks, advanced persistent threats (APTs), and insider threats. It monitors both north-south and east-west (lateral) movements to detect the widest range of attacks.
"Stealthwatch provides visibility and security intelligence across the extended enterprise and the entire attack continuum."
Accelerated Incident Response
Stealthwatch does more than improve real-time threat detection. It turns NetFlow and other types of network data into actionable intelligence to speed incident response.
"Network and security troubleshooting time is often reduced from days or months to just minutes."
Faster, More Accurate Forensic Investigations
Stealthwatch's ability to store network data for months or even years provides an invaluable historical audit trail of all network activity. This capability makes Stealthwatch essential for conducting faster, more precise post-incident forensic investigations.
Cisco Identity Services Engine (ISE)
Consistently enforce policies across the network and scale from mobile users to the data center.
Use the Cisco Identity Services Engine, our award-winning central policy management platform, to:
- Gather advanced contextual data about who and what are accessing your network
- Define role-based access using security group tags to segment your network
- Enforce these policies across your Cisco TrustSec-enabled network devices
Next-generation secure network access
With ISE you gain awareness of everything hitting your network. Provide access consistently and efficiently. Relieve the stress of complex access management.
Control all access from one place
Simplify access across wired, wireless, and VPN connections. Policies are cascaded across all types of access points and cascade policies easily across all types of access points.
See and share rich user and device details
Users and devices see a simple, flexible interface. Then share these details through the Cisco Platform Exchange Grid (pxGrid) with partner platforms to make them user, device, and network aware.
Rapid threat containment
ISE can assess vulnerabilities and apply threat intelligence so you can reduce risks and contain threats by dynamically controlling network access. You can also contain a suspicious device for remediation.
Cisco TrustSec technology simplifies the provisioning of network access, accelerates security operations, and consistently enforces policy anywhere in the network.
This scalable and agile segmentation technology is embedded in more than 40 switches, routers, wireless devices, and other Cisco products.
Traffic classification is based on endpoint identity, not IP address.
It is also not based on IP-based access control lists (ACLs), so policy changes don’t require network redesign.
"With TrustSec you can stop malicious actors from accessing your network and meet compliance goals more easily."
See how you can best implement network segmentation with Cisco TrustSec:
"TrustSec simplifies the security access model and
allows for much less policy maintenance."
Forrester TEI Report Simplified Security Engineering and Reduced Operations Costs Enabled By Cisco TrustSec
Simplified Access Management
- Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network
- Easily manage access control and segmentation while maintaining compliance
- Create and manage policies in an easy-to-use matrix
Lower Operational Expenses associated with Security
- Limit the impact of data breaches and prevent the lateral movement of threats and compromised devices
- Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration
- Easily comply with PCI audits and other compliance requirements using network segmentation
The Value Add of bringing the different technologies together:
Stealthwatch, ISE and TrustSec work in tandem together to give you the most robust network security. Together you can identify and appropriately segment critical network assets, as well as monitor usage policies, to improve access control and protection.
Want to find out more about our security capabilities? Watch Kevin Skahill explain how network sensing and software-defined segmentation is used to protect endpoints and applications against a new and sophisticated species of threats.