AI智能总结
INTRODUCTION Many of today’s remote worker architectures are not suited to the modern digital workplace. Having been deployed as an extension of the classic centralizedIT infrastructure stack, they are not optimized for latency-sensitive and data-intensive modern application workflows. Furthermore, the inflexible nature of acentralized security stack, and the performance challenges of centralized data repositories and application hosting have a negative impact on the quality ofexperience. The modern digital workplace experience is designed for ubiquitous, performant, and always-on secure access to data and applications. Users unpredictability routed acrossInternet negatively impacts customer/employee experience3 Capacity is hosted at points ofpresence and interconnected to cloudsto create elasticity1 Increased usage results in computebound performance bottlenecks1 Users, things, networks and capacity areintegrated within proximity of centers of dataexchange to optimize workflow & experience3 Backhauls the user to centralizedsystems, resulting in network boundperformance bottlenecks2 Traffic is consolidated at points ofpresence and interconnected to localservices optimized for latency, throughputand ubiquity2 Centralized security enforcement viabackhaul doesn’t address vulnerabilitypoints or improve security posture4 Security controls are hosted and intercon-nected at points of presence to enable policyenforcement at ingress/egress points4 SOLUTION STEP 3 IMPLEMENT HYBRID IT CONTROLS STEP 1 REWIRE THE NETWORK STEP 2 OPTIMIZE DATA EXCHANGE Performant Quality of Experience Zero Trust Security Model ACTION: IMPLEMENT NETWORK HUB ACTION: IMPLEMENT CONTROL HUB ACTION: IMPLEMENT DATA HUB Deploy network hubs to optimize traffic flows, host capacityand connect to clouds and service providers at points ofpresence. Deploy control hubs to distribute security policy enforce-ment and inspection. Deploy data hubs at points of presence to leverage centersof data exchange. +Host IT and security controls and enable policy enforcement at dataingress/egress points to maintain data compliance and sovereignty+Deploy tailored infrastructure footprints to accommodate specialpurpose security, telemetry and logging infrastructure configurations+Operate deployments as one seamless, secure global data centerinfrastructure +Solve global coverage, capacity and connectivity needs+Deploy tailored infrastructure matched to business need irrespectiveof size, scale or configuration+Operate deployments as a seamless extension of global infrastructurewith consistent experience, security and resiliency +Interconnect ecosystems of networks, clouds and partners+Secure multi-cloud access with direct interconnection (physicaland virtual)+Segment, tailor and provision interconnection matched to businessneeds in terms of type, speed, destination, participant or time of day OUTCOME+Reduce IT vulnerability points and improve security posture OUTCOME+Implement distributed data staging and aggregation OUTCOME+Reduce latency and increase throughput +Deploy telemetry and apply policy at points of ingress/egress+Reduce operational complexity and simplify infrastructure management +Deploy regional data lakes and distributed data warehouses+Maintain compliance and sovereignty +Increase bandwidth per employee cost-effectively+Enable performant multi-cloud connectivity SOLUTION STEP 1 REWIRE THE NETWORK ACTION: IMPLEMENT NETWORK HUB Deploy network hubs to optimize traffic flows, host capacityand connect to clouds and service providers at points ofpresence. 1.Multiple ISPs and Internet Exchanges are connected toedge routers to provide redundant Internet access to thecustomers’ environment.2.Enterprise security stack is deployed to border between theenterprise network and Internet resources.3.IoT, VPN, and Client VPN devices are deployed behind theenterprise security stack to provide gateway services toremote devices, users, and partners.4.Network Core layer provides enterprise routing andsegmentation. Highly scalable data center routing andswitching platform ties all enterprise resources together.5.Tie remote locations and users to the enterprise usingreliable and cost effective network solutions such as broad-band internet, Cellular (4G or 5G), or other WAN technologies. 6.Leverage services, such as carrier ethernet to tie remotelocations as well as headquarter locations to the NetworkHub. Leverage services such as carrier ethernet to tieremote locations as well as headquarter locations to theNetwork Hub. Leverage MPLS network where required or aspart of the migration strategy to a modern SDN architecture.7. Critical applications services can be located inside of theNetwork Hub to reduce latency and provide a distributedarchitecture for these services.8.Securely interconnect to cloud ecosystem, including leadingIAAS, PAAS and SAAS providers. Build hybrid and multi-cloud deployments. Provide cloud services with enterprisesecu