Summary: In this video hear from the CTO of Global Commercial about how our customers' changing multicloud network environment creates a need for a Secure SD-WAN solution. This video covers Cisco's routing portfolio and explains how sellers should differentiate our superior technology solutions with their customer, dependent upon their unique needs. Presented by: Sarah Eccleston. Published: May 2019.
Summary: In this video the CTO for Global Commercial goes into detail about the Meraki and Viptella components of Cisco's SD-WAN solution. She explains why the ISR 4K is "the best router on the planet" and offers sellers guidance when to lead with each of the components covered, dependent upon your customer's needs. Software defined access is explained as segmentation, with real world examples provided. In addition, sellers will learn why onRamp is a key differentiator for customers using SaaS applications. Presented by: Sarah Eccleston. Published: May 2019.
Summary: This video goes into more detail about the security components of Cisco's Secure SD-WAN solution. It covers the multifactor authentication of Duo, explains how Cloudlock is giving IT the visibility of all the apps being accessed, and covers Umbrella's unique capabilities. Stealthwatch has the ability to do encrypted traffic analysis - a key unique selling point that only Cisco has. Presented by: Sarah Eccleston. Published: May 2019.
This playbook is a single point of reference for selling Cisco software-defined wide-area network (SD-WAN) solutions. It offers guidance and links to further information that will help you throughout your Cisco SD-WAN sales cycle
Protect all your users, devices, and applications with the best threat intelligence by deploying the right security in the right place, quickly.
Deliver the best user experience without compromising any connection to any cloud no matter where your applications are hosted.
Benefit from a unified architecture that combines best-in class SD-WAN and security in a single user interface and a single consumption model.
Current branch infrastructure
Technical requirements
Future business goals for branch transformation
Security requirements
Carrier types and contract terms
IT staff support
Is customer “exploring SD-WAN” or are we being proactive in the account
Which type of competitive SD-WAN player is engaged, and how do we position(s) our solution to win
Service chaining
Secure segmentation
Architecture play in SDA journey
Full stack branch management
Embedded security