(Google Translate)

Products: Cisco Systems, Inc. (CSCO)

Infrastructure Platforms(LAN Access Switches)
Applications(Network Function Virtualization (NFV) products)
Security(Cisco Adaptive Security Virtual Appliance (ASAv))
Other Products(Other Products)
Services(Cisco Application Policy Infrastructure Controller (APIC))

Cisco Systems, Inc.

General

Cisco designs and sells a broad range of technologies that have been powering the Internet since 1984. Across networking, security, collaboration, applications and the cloud, our evolving intent-based technologies are constantly learning and adapting to provide customers with a highly secure, intelligent platform for their digital business.

Competition

We compete in the networking and communications equipment markets, providing products and services for transporting data, voice, and video traffic across intranets, extranets, and the Internet. These markets are characterized by rapid change, converging technologies, and a migration to networking and communications solutions that offer relative advantages. These market factors represent both an opportunity, and a competitive threat to us. We compete with numerous vendors in each product category. The overall number of our competitors providing niche product solutions may increase. Also, the identity and composition of competitors may change as we increase our activity in our new product markets. As we continue to expand globally, we may see new competition in different geographic regions. In particular, we have experienced price-focused competition from competitors in Asia, especially from China, and we anticipate this will continue.

Our competitors include Amazon Web Services LLC; Arista Networks, Inc.; ARRIS Group, Inc.; Check Point Software Technologies Ltd.; Dell Technologies Inc.; Extreme Networks, Inc.; F5 Networks, Inc.; FireEye, Inc.; Fortinet, Inc.; Hewlett-Packard Enterprise Company; Huawei Technologies Co., Ltd.; Juniper Networks, Inc.; Lenovo Group Limited; Microsoft Corporation; New Relic, Inc.; Nokia Corporation; Nutanix, Inc.; Palo Alto Networks, Inc.; Symantec Corporation; Ubiquiti Networks and VMware, Inc.; among others.

Some of these companies compete across many of our product lines, while others are primarily focused in a specific product area. Barriers to entry are relatively low, and new ventures to create products that do or could compete with our products are regularly formed. In addition, some of our competitors may have greater resources, including technical and engineering resources, than we do. As we expand into new markets, we will face competition not only from our existing competitors but also from other competitors, including existing companies with strong technological, marketing, and sales positions in those markets. We also sometimes face competition from resellers and distributors of our products. Companies with which we have strategic alliances in some areas may be competitors in other areas, and in our view this trend may increase. For example, the enterprise data center is undergoing a fundamental transformation arising from the convergence of technologies, including computing, networking, storage, and software, that previously were segregated within the data center. Due to several factors, including the availability of highly scalable and general purpose microprocessors, application-specific integrated circuits offering advanced services, standards-based protocols, cloud computing, and virtualization, the convergence of technologies within the enterprise data center is spanning multiple, previously independent, technology segments. Also, some of our current and potential competitors for enterprise data center business have made acquisitions, or announced new strategic alliances, designed to position them to provide end-to-end technology solutions for the enterprise data center. As a result of all of these developments, we face greater competition in the development and sale of enterprise data center technologies, including competition from entities that are among our long-term strategic alliance partners. Companies that are strategic alliance partners in some areas of our business may acquire or form alliances with our competitors, thereby reducing their business with us.

The principal competitive factors in the markets in which we presently compete and may compete in the future include:

  • The ability to sell successful business outcomes
  • The ability to provide a broad range of networking and communications products and services
  • Product performance
  • Price
  • The ability to introduce new products, including providing continuous new customer value and products with price-performance advantages
  • The ability to reduce production costs
  • The ability to provide value-added features such as security, reliability, and investment protection
  • Conformance to standards
  • Market presence
  • The ability to provide financing
  • Disruptive technology shifts and new business models

We also face competition from customers to which we license or supply technology, and suppliers from which we transfer technology. The inherent nature of networking requires interoperability. Therefore, we must cooperate and at the same time compete with many companies. Any inability to effectively manage these complicated relationships with customers, suppliers, and strategic alliance partners could have a material adverse effect on our business, operating results, and financial condition and accordingly affect our chances of success.

Research and Development

We regularly introduce new products and features to address the requirements of our markets. We allocate our research and development budget among our product categories, which consist of Infrastructure Platforms, Applications, Security, and Other Product technologies. Our research and development expenditures were $6.3 billion, $6.1 billion, and $6.3 billion in fiscal 2018, 2017, and 2016, respectively. These expenditures are applied generally to all product areas, with specific areas of focus being identified from time to time. Recent areas of increased focus include our intent-based networking technologies (which encompasses switching, routing, and wireless technologies within Infrastructure Platforms), security, and analytics products. Our expenditures for research and development costs were expensed as incurred.

The industry in which we compete is subject to rapid technological developments, evolving standards, changes in customer requirements, and new product introductions and enhancements. As a result, our success depends in part upon our ability, on a cost-effective and timely basis, to continue to enhance our existing products and to develop and introduce new products that improve performance, and reduce total cost of ownership. To achieve these objectives, our management and engineering personnel work with customers to identify and respond to customer needs, as well as with other innovators of Internet working products, including universities, laboratories, and corporations. We also expect to continue to make acquisitions and investments, where appropriate, to provide us with access to new technologies. Nonetheless, there can be no assurance that we will be able to successfully develop products to address new customer requirements and technological changes or that those products will achieve market acceptance.

Manufacturing

We rely on contract manufacturers for all of our manufacturing needs. We presently use a variety of independent third-party companies to provide services related to printed-circuit board assembly, in-circuit test, product repair, and product assembly. Proprietary software on electronically programmable memory chips is used to configure products that meet customer requirements and to maintain quality control and security. The manufacturing process enables us to configure the hardware and software in unique combinations to meet a wide variety of individual customer requirements. The manufacturing process uses automated testing equipment and burn-in procedures, as well as comprehensive inspection, testing, and statistical process controls, which are designed to help ensure the quality and reliability of our products. The manufacturing processes and procedures are generally certified to International Organization for Standardization (ISO) 9001 or ISO 9003 standards.

Our arrangements with contract manufacturers generally provide for quality, cost, and delivery requirements, as well as manufacturing process terms, such as continuity of supply; inventory management; flexibility regarding capacity, quality, and cost

management; oversight of manufacturing; and conditions for use of our intellectual property. We have not entered into any significant long-term contracts with any manufacturing service provider. We generally have the option to renew arrangements on an as-needed basis. These arrangements generally do not commit us to purchase any particular amount or any quantities beyond certain amounts covered by orders or forecasts that we submit covering discrete periods of time, defined as less than one year.

Patents, Intellectual Property, and Licensing

We seek to establish and maintain our proprietary rights in our technology and products through the use of patents, copyrights, trademarks, and trade secret laws. We have a program to file applications for and obtain patents, copyrights, and trademarks in the United States and in selected foreign countries where we believe filing for such protection is appropriate. We also seek to maintain our trade secrets and confidential information by nondisclosure policies and through the use of appropriate confidentiality agreements. We have obtained a substantial number of patents and trademarks in the United States and in other countries. There can be no assurance, however, that the rights obtained can be successfully enforced against infringing products in every jurisdiction. Although we believe the protection afforded by our patents, copyrights, trademarks, and trade secrets has value, the rapidly changing technology in the networking industry and uncertainties in the legal process make our future success dependent primarily on the innovative skills, technological expertise, and management abilities of our employees rather than on the protection afforded by patent, copyright, trademark, and trade secret laws.

Many of our products are designed to include software or other intellectual property licensed from third parties. While it may be necessary in the future to seek or renew licenses relating to various aspects of our products, we believe, based upon past experience and standard industry practice that such licenses generally could be obtained on commercially reasonable terms. Nonetheless, there can be no assurance that the necessary licenses would be available on acceptable terms, if at all. Our inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, or the need to engage in litigation regarding these matters, could have a material adverse effect on our business, operating results, and financial condition. Moreover, inclusion in our products of software or other intellectual property licensed from third parties on a nonexclusive basis can limit our ability to protect our proprietary rights in our products.

The industry in which we compete is characterized by rapidly changing technology, a large number of patents, and frequent claims and related litigation regarding patent and other intellectual property rights. There can be no assurance that our patents and other proprietary rights will not be challenged, invalidated, or circumvented; that others will not assert intellectual property rights to technologies that are relevant to us; or that our rights will give us a competitive advantage. In addition, the laws of some foreign countries may not protect our proprietary rights to the same extent as the laws of the United States.

Employees

Employees are summarized as follows (approximate numbers): 74,200

Infrastructure Platforms

Infrastructure Platforms consist of our core networking technologies of switching, routing, data center products, and wireless that are designed to work together to deliver networking capabilities and transport and/or store data. These technologies consist of both hardware and software offerings that help our customers build networks, automate, orchestrate, integrate, and digitize data. We believe it is critical for us to continue to deliver continuous value to our customers. Over fiscal 2018, we made ongoing progress in shifting more of our business to software and subscriptions across our core networking portfolio, and in expanding our software offerings. Our objective is to continue moving to cloud-managed solutions across our entire enterprise networking portfolio. We continue to expand on our intent driven infrastructure, which focuses on simplicity, automation, and security, allowing enterprises to manage and govern the interactions of users, devices and applications across their IT environments. In fiscal 2017, we launched our Cisco Catalyst 9000 series of switches, which were developed for security, mobility, the Internet of Things (IoT), and the cloud. These switches form the foundation for our leading enterprise architectures, built on the principles of Cisco DNA. We continue to expand on this technology by extending SD-Access and Cisco DNA Center to the IoT environment and Application Centric Infrastructure (ACI) to the public cloud.

Our switching portfolio encompasses campus switching offerings as well as data center switching offerings. Our campus switching offerings provide the foundation for converged data, voice, video, and IoT services. These switches offer enhanced security and reliability and are designed to scale efficiently as our customers grow. Within campus switching are the recently launched Catalyst 9000 series of switches that include hardware with embedded software, along with, a software subscription referred to as Cisco DNA. Cisco DNA provides automation, analytics and security features and can be centrally monitored, managed, and configured. Our data center switching offerings provide the foundation for mission critical data centers with high availability, scalability, and security across traditional data centers and private and public cloud data centers.

Our routing portfolio interconnects public and private wireline and mobile networks and mobile networks, delivering highly secure and reliable service to campus, data center and branch networks. Our routing solutions are designed to meet the scale, reliability, and security needs of our customers. During fiscal 2018, we introduced the principles of Cisco DNA into our routing portfolio along with software-defined wide area network (SD-WAN), increasing flexibility and simplicity and delivery through the cloud.

Our Data Center portfolio incorporates various technologies and solutions including the Cisco Unified Computing System (Cisco UCS), HyperFlex (HX), and software management capabilities which combine computing, networking, and storage infrastructure management and virtualization to deliver agility, simplicity and scale. These products are designed to extend the power and simplicity of unified computing for data-intensive workloads, applications at the edge, and the next generation of distributed application architectures.

Our Wireless portfolio provides indoor and outdoor wireless coverage designed for seamless roaming use of voice, video, and data applications. These products include wireless access points that are standalone, controller appliance-based, switch-converged, and Meraki cloud-managed offerings. In fiscal 2018, we expanded our capabilities to include network assurance and automation through our Cisco DNA Center and location-based services.

Infrastructure Platforms Gallery

Applications

The Applications product category consists primarily of software-related offerings that utilize the core networking and data center platforms to provide their functions. Our Applications offerings consist of both hardware and software-based solutions, including both software licenses and software-as-a-service. Applications include our collaboration offerings (unified communications, Cisco TelePresence and conferencing) as well as the IoT and analytics software offerings from Jasper and AppDynamics, respectively.

Our strategy is to make collaboration more effective, comprehensive, and less complex by creating innovative solutions through combining the power of software, hardware, and the network. We offer a portfolio of solutions which can be delivered from the cloud, premise or mixed environments, and which integrate voice, video, and messaging on fixed and mobile networks across a wide range of devices/endpoints such as mobile phones, tablets, desktop and laptop computers, video units and collaboration appliances. Growth in cloud-connected products and services was highlighted by the acquisition of BroadSoft, a leading provider of cloud-based unified communications. In addition, we announced innovative new cloud-connected products and services within our Collaboration portfolio including the Cisco WebexVirtual Assistant, AI driven voice assistance for workplace collaboration, and Webex Room telepresence endpoint devices. For on-premise collaboration markets, we launched multi-party Internet Protocol (IP) Phones to extend our reach into third-party call control platforms as well as a new series of telephony headsets which offer innovative integration with our market leading IP phone business.

Our analytics solutions seek to help businesses deliver consistently high quality digital experiences by connecting end-user experience and application performance to business outcomes. Our applications monitor, correlate, analyze, and act on application

performance and business performance data in real time. This automated, cross-stack intelligence enables developers, IT operations, and business owners to make mission critical and strategic improvements.

We continue to invest in IoT as the number of connected IoT devices continues to grow. Our Jasper Control Center Platform enables enterprises to automate the lifecycle of connected devices, including tools designed to automatically and remotely onboard, manage and monetize their IoT devices.

Applications Gallery

Security

The Security product category primarily includes our unified threat management products, advanced threat security products, and web security products that are designed to provide a highly secure environment for our customers. Security continues to be the top IT priority for many of our customers and we continue to believe that security solutions will help to protect the digital economy. We believe that security will be an enabler that helps safeguard our customers’ business interests and can help create competitive advantage for them. Our approach is designed to provide protection across the entire attack continuum before, during, and after a cyber-attack and to help our customers shorten the time to threat detection and response. In our view, the escalation of ransomware and other malware events in the past year demonstrates that organizations are more critically exposed than ever.

Our security portfolio is designed to increase capability while reducing complexity by delivering simple, open, and automated solutions resulting in more effective security. Our security portfolio spans endpoints, the network, and the cloud. Our offerings cover the following network-related areas: network and data center security, advanced threat protection, web and email security, access and policy, unified threat management, and advisory, integration, and managed services. Our offerings are powered by Cisco Talos, our industry-leading, cloud delivered threat intelligence platform.

In fiscal 2018, we continued to invest in cloud security. These investments include introducing our Stealthwatch Cloud, behavioral threat detection for IaaS (infrastructure as a service) and PaaS (platform as a service) environments, extending our Umbrella Platform capabilities, and providing new functions such as shadow IT discovery in CloudLock, our CASB (Cloud Access Security Broker) solution. We significantly extended our endpoint security portfolio (Advanced Malware Protection for Endpoints) with new exploit prevention capabilities for fileless malware. We remain focused on delivering an integrated architecture across our Security products, highlighted by the introduction of Cisco Visibility, a unified threat management platform across many of our products.

Other Products

Our Other Products category primarily consists of Service Provider Video Software and Solutions and cloud and system management products. We announced a definitive agreement to sell our Service Provider Video Software and Solutions business in the fourth quarter of fiscal 2018. We expect this transaction to close in the first half of fiscal 2019 subject to regulatory approvals and customary closing conditions.

Security and Other Gallery

Services

In addition to our product offerings, we provide a broad range of service and support options for our customers, including technical support services and advanced services. In fiscal 2019, we introduced Customer Experience, combining our overall service and support offerings into one organization that is responsible for the end-to-end customer experience.

Technical support services help our customers ensure their products operate efficiently, remain available, and benefit from the most up-to-date system, and application software. These services help customers protect their network investments, manage risk, and minimize downtime for systems running mission-critical applications. A key example is Cisco Smart Services, which leverages the intelligence from the installed base of our products and customer connections to protect and optimize network investment for our customers and partners. We have expanded our Technical Services offerings from traditional hardware support to software, solutions, and premium support and outcome based offers.

Advanced services are part of a comprehensive program that is focused on providing responsive, preventive, and consultative support of our technologies for specific networking needs. We are investing in and expanding our advanced services in the areas of cloud, security, and analytics, which reflects our strategy of selling customer outcomes. We are focused on three priorities including, utilizing Technology Advisory Services to drive higher product and services pull-through; Assessment and Migration services providing the tools, expertise and methodologies to enable our customers to migrate to new technology platforms; and providing optimization services aligned with customers’ measurable business outcomes.

We believe this strategy, along with our architectural approach and networking expertise, has the potential to further differentiate us from competitors.

Network Services Gallery