Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

Cisco Enterprise Agreement: New and Improved!

Researcher by Researcher
September 28, 2022
in Networking
0
Cisco Enterprise Agreement: New and Improved!
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


It has been over two years since I last wrote about Cisco’s Enterprise Agreements (EA). It’s time for a refresher of Cisco’s lead software buying motion!

What has changed in the Cisco EA?

Let’s start off with what hasn’t changed. A Cisco EA still enables you access to world-class software solutions at great prices. And a Cisco EA relieves the burden of managing a portfolio of licenses for separate software solutions.

Related articles

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
An EA Simplifies Procurement and Pricing
Figure 1: An EA Simplifies Procurement and Pricing

But now a single Cisco EA encompasses Cisco’s entire software portfolio, all under a single contract. A contract that can scale as rapidly as your business requires. An EA offers you the most seamless licensing construct for Cisco software, and most importantly, saves your business money by ensuring that you receive the best price for all of your Cisco software licenses. As you can see from Figure 2 below, Cisco has made the EA even more inclusive.

Single Contract Across Cisco's Entire Software Portfolio
Figure 2: Single Contract Across Cisco’s Entire Software Portfolio

The whole goal behind revamping EAs was to expand the breadth of Suites (individually named circles in Figure 3 below) eligible for inclusion in an EA.

Representation of Cisco Portfolios, Solutions and Suites eligible for inclusion in an EA
Figure 3: Representation of Cisco Portfolios, Solutions and Suites eligible for inclusion in an EA

The key takeaway is more products from more Cisco Portfolios (the five inner wedges) are covered within a single EA than ever before – further streamlining licensing!

Read on to learn of more changes and features Cisco has brought to market to address customer pain points, improve the software buying experience, and craft Solutions (collection of Suites connected by the dotted lines) for today’s business environment.

  • Easier Expansion: Flexible purchase options now include a partial commitment. You can now add Suites to an EA without the need to decommission non-Cisco hardware.
  • Comprehensive Solutions: Seamlessly add Security and Services Suites to any EA. Unlock the full breadth of these two Portfolios once you have committed to a single Suite in any Portfolio.
  • Unified Experience: An EA brings all Portfolios under a single T&C agreement with simplified legal terms which, among other things, aligns all termination dates with one another
  • Partner Flexibility: Choose from and work with multiple partners for your Cisco purchases within a single EA
  • Economic Advantage: Predictable pricing. True Forward eliminates retroactive billing. Value Shift between Solutions and within Suites permits license quantity adjustments on the fly.

As you can see, the latest iteration of Cisco’s EA really covers all the bases!

 

“The new Enterprise Agreement (EA) now spans across the entire Cisco product and service portfolio, where previously customers and partners had to manage multiple EAs, bringing together the full portfolio into one purchase agreement.”

– Practice Director and Senior Analyst Networking and Converged Infrastructure, ESG

 

What’s Value Shift and How Does It Work?

One of the groundbreaking features of Cisco EAs is enabling customers to effectively right-size purchased licenses. Think of Value Shift as a substantial improvement to license portability. Within a Portfolio, customers can shift the value of fully committed software from one Suite where licenses are being under-consumed to another Suite where licenses are being over-consumed. This is only available in an EA!

Prior to the launch of Value Shift, license portability was largely a function of crediting any extra licenses back and then repurchasing the licenses needed. This was an incredibly cumbersome and inefficient way to handle things. Not to mention being particularly customer unfriendly!

But with Value Shift, Cisco now has the ability to systematically weigh the over-consumption of licenses in one Suite against the under-consumption of licenses in a completely different Suite, within the same Solution. For example, if you are over-consuming $7500 worth Cisco DNA for SD-WAN and Routing licenses in your EA but have $8500 of under-consumed Cisco DNA Wireless licenses in the EA, no harm, no foul! Since Cisco DNA Software is the Solution both Suites belong to, it’s all good.

As of this writing, all intra-Solution Value Shifts are working in the EA framework. For example, the under-consumption of Umbrella licenses will systemically offset the over-consumption of Secure Firewall licenses in the Cloud & Network Security Solution.

Today, the only cross-Solution Value Shift permitted is between the Meraki Solution and the Cisco DNA Software Solution. For example, the under-consumption of Cisco DNA for Switching licenses will systematically offset the over-consumption of Meraki Vision licenses. But Cisco is hard at work to enable full cross-Suite Value Shift functionality within each Portfolio.

 

Get in touch with your Cisco Account Manager to explore

how a Cisco EA can revolutionize your technology spend!

Additional resources:

Cisco Enterprise Agreement Website

Cisco Enterprise Agreement Program Guide

Networking Infrastructure EA Portfolio Guide

Contact Cisco

Share:



Source link

Tags: AgreementCiscoenterpriseimproved
Share76Tweet47

Related Posts

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

September 22, 2023
0

The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as...

How to Create and Use a Docker Secret From a File (+ Video)

How to Create and Use a Docker Secret From a File (+ Video)

September 20, 2023
0

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. https://www.youtube.com/watch?v=TfVCXaMRNgM...

Window Closing for Australian Businesses to Upgrade From 3G

Window Closing for Australian Businesses to Upgrade From 3G

September 13, 2023
0

Image: Jon Anders Wiken/Adobe Stock It is the end of an era. Twenty years ago, 3G wireless connectivity started rolling...

Google Cloud Next ‘23: New Generative AI-Powered Services

Google Cloud Next ‘23: New Generative AI-Powered Services

August 30, 2023
0

Image: Sundry Photography/Adobe Stock Google unveiled a wide array of new generative AI-powered services at its Google Cloud Next 2023...

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

Microsoft Tops List of Most-Impersonated Brands in Phishing Exploits

August 29, 2023
0

Image: Timon/Adobe Stock A significant portion of social engineering attacks, such as phishing, involve cloaking a metaphorical wolf in sheep’s...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved