Applications are one of the most important things in the data center. But they are misunderstood.
If it weren't for applications, we wouldn't build the data center. It's the application that makes infrastructure and user data relevant to the business. It's what drives business value.
The realization of this basic axiom is what has driven us to build Application Centric Infrastructure -ACI. Our primary goal is to enable the automation of policy, network-based security, and operations for applications in the data center.
The ACI technology easily provides great value in automating operations of classical networking processes.
But to unlock its full potential, you must have a good understanding ofwhatapplications are running in your data center, how they are composed, and how they are inter-dependent upon services and one another.
What we've discovered is that the majority of our customers don't actually know the level of detail about their applications necessary to enable a truly Application Centric approach to managing their data center.
Without that understanding, they can't create a white-list security model, they can't migrate applications with minimal risk, and they can't triage problems in an application-focused manner.
Tetration Analytics was created to solve these problems, amongst others, at scale.
Tetration leverages the fact that the network is the only thing in the data center that touches all other components.
We harvest meta data from all of this communication and developed applications that extract value from it. These applications provide unprecedented visibility into what is happening in the data center - and they giveinsight, in addition to just showing the facts.
Our customers have been running their data centers essentially in the dark with no understanding of how the various parts are moving and interacting.
Tetration takes a "lights out" data center and turns the "lights back on".
The power of visibility and understanding helps our customers manage their services and SLAs ...in real time. It helps them plan, operate, and troubleshoot their infrastructure.
You have to see it and measure it before you can manage it.
Now, we are taking Tetration to the next level -securing those applications.
The dichotomy of agility and security -rapid application deployment and ability to enforce policies and compliance -is a complex challenge for our customers.
Tetration uses software sensors that can be deployed across heterogeneous environments: from public or private clouds, to virtual machines and bare metal servers, and from the network all the way to the endpoint.
You install a sensor in a server, and you don't have to worry about it anymore. It's all managed centrally through the Tetration interface.
Those sensors not only gather the meta data needed to provide visibility, but now can also enforce access policy across heterogeneous environments.
Together, Tetration's policy recommendation and enforcement engine can deliver fine-grained Application Segmentation -far better than today's micro-segmentation solutions -and at greater scale.
Using Tetration:
Never before has this level of integration, ubiquity, and scale been delivered in a single platform.
What you get:a single policy that incorporates multiple requirements, provides enforcement across heterogeneous infrastructures, and is monitored in real-time.
All this through a single, powerful, intuitive, multi-tenant, multi-user interface.
Tetration APIs allow you to write an application, upload it to the Tetration platform, and have that application mine the data -the same historical and real-time data our applications have access to -and generate reports and alerts.
This allows views and insights to be created by our customers that are unique to their specific industry, applications, environment and ecosystem.
You'll see our ecosystem thriving in the months ahead, as Tetration easily integrates with third party applications and as our customers build their own applications to fit their business needs.
Putting applications at the heart of our products has pushed our creativity and challenged the best minds.
One day, we envision a self-driving data center -similar to the self-driving car:
When you say to a self-driving car, "I want to drive from San Jose to San Francisco," you are describing what you want the car to do, what is yourintent. That car must then sense the conditions on the road, the cross-traffic, its speed, etc. It must adhere to the traffic laws and be defensive to intentional and unintentional threats.
We at Cisco have that vision for the data center, and we want to make sure you make it to your destination -where you intended to go, even if that's the moon.
It is possible. And we are well on our way.