how you can achieve byod without compromise€¦ · •byod devices begin un-configured, everything...

Post on 17-Jul-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

How You Can Achieve BYOD without Compromise

Paul Durzan

Director of Business Development Cisco

© 2012 Cisco and/or its affiliates. All rights reserved. 2 © 2012 Cisco and/or its affiliates. All rights reserved. 2

BYOD Smart Solution Paul Durzan

Director, BYOD Smart Solution

For Network World, Sept. 27, 2012

© 2012 Cisco and/or its affiliates. All rights reserved. 3

Wired Wireless

© 2012 Cisco and/or its affiliates. All rights reserved. 4

Location/Device/Application Independent

© 2012 Cisco and/or its affiliates. All rights reserved. 5

COLLEGE STUDENTS

AND

YOUNG

PROFESSIONALS

CONSIDER INTERNET A

FUNDAMENTAL

HUMAN RESOURCE

OF COLLEGE

STUDENTS

OF YOUNG

EMPLOYEES

AND

SAY THEY COULD NOT LIVE

WITHOUT THE INTERNET

© 2012 Cisco and/or its affiliates. All rights reserved. 6

COLLEGE STUDENTS GLOBALLY

WOULD CHOOSE AN INTERNET

CONNECTION OVER A CAR

INTERNET CAR

© 2012 Cisco and/or its affiliates. All rights reserved. 7

OF

STUDENTS

OF

EMPLOYEE

S

CITE A MOBILE DEVICE

(LAPTOP, SMARTPHONE,

TABLET) AS “THE MOST

IMPORTANT

TECHNOLOGY IN THEIR

LIVES.”

SMARTPHONES ARE POISED TO

SURPASS DESKTOPS AS THE

MOST PREVALENT TOOL FROM A

GLOBAL PERSPECTIVE

© 2012 Cisco and/or its affiliates. All rights reserved. 8

BYOD is Already Popular with Employees

Smartphone

35%

Percent Currently Using Their Own

Source Yankee Group—June

2012

Laptop

53%

Tablet

7%

© 2012 Cisco and/or its affiliates. All rights reserved. 9

of organizations will allow personal devices for work use. —Gartner 90%

© 2012 Cisco and/or its affiliates. All rights reserved. 10

100% of IT is struggling to keep up with mobility trends.

—Gartner

© 2012 Cisco and/or its affiliates. All rights reserved. 11

Do It All

Securely

© 2012 Cisco and/or its affiliates. All rights reserved. 12

Operations—

Adding,

Managing,

Provisioning,

Servicing Devices

Loss Of Control

Device Security

Network Security

Not Knowing Who

Is on the Network

Compliance

Data Security

© 2012 Cisco and/or its affiliates. All rights reserved. 13

Virtual Desktop plus

Enterprise

Collaborative

Applications

Virtual

Native or Web-Based

Applications, Securely

Native/Physical

INTELLIGENT

NETWORK

Hybrid Approach

© 2012 Cisco and/or its affiliates. All rights reserved. 14

Sees All Traffic

Routes All Requests Sources All Data

Controls All Flows

Handles All Devices

Touches All Users

Shapes All Streams

© 2012 Cisco and/or its affiliates. All rights reserved. 15

I Can Use iPads on My

Network

End User

Drive New Business Models

Increase Productivity

Business

Increase Agility Attract And Retain

Talent

Speed Time To Market

Simplify Operations

Mitigate Risk IT

Simple Approach

Comprehensive

Approach

I Need a Comprehensive BYOD Strategy

© 2012 Cisco and/or its affiliates. All rights reserved. 16

16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Fingerprint Device

Authenticate User

Apply Corporate

Configuration

Enterprise Apps

Onboarding

• BYOD devices

begin un-

configured,

everything

must be added

• Automatically

onboard the

right device

and the right

person

• Contextual

policy and in

depth

fingerprinting

• Securely

profile and

provision

Right People and

Devices Have

Access to the

Right Information

© 2012 Cisco and/or its affiliates. All rights reserved. 17

Secure

Access

• AAA

• Profiling and

provisioning

• Unified Policy

• Prevent

compromised

devices

• Policy

enforcement of

device type,

user, location

• Guest access -

an extension of

corporate

• Compliance

and visibility

Right People and

Devices Have

Access to the

Right Information

Truste

d Wi

F i

Truste

d Wi

F i

Access: Limited

Filtered EMR

Internet

Patient visit

tracking

© 2012 Cisco and/or its affiliates. All rights reserved. 18

Secure

Devices

• Pin lock

protection

• Compliance

checks—is it

jail broken?

• Application

provisioning

and

management

• Data loss

prevention—

remote wipe,

containers

Manage and

Secure the

Device and

Workspace

Truste

d Wi

F i

Truste

d Wi

F i

Local and Remote

Wipe

Encryption and

Management

4 Digit PIN

10 Minute Timeout

© 2012 Cisco and/or its affiliates. All rights reserved. 19

Truste

d Wi

F i

Truste

d Wi

F i

Workspace

Delivery

• Pervasive—

coverage for

density

• Predictable—

wireless an

extension of

wired

• Ability to

mitigate

negative

environments

• Ability to

optimize

delivery of

workspace

• One

management,

one network

Effective

Workspace

Delivery

© 2012 Cisco and/or its affiliates. All rights reserved. 20

1997 2007 2003 1999

2

290 290

11

130

0

870

54

(24

)

6900

3500

*

1730

*

600

690

0

450

300

65

802.11

HT 802.11n 802.11b 802.11a/

g

VHT 802.11ac

Wave1

VHT 802.11ac

Wave2

* Assuming 160 MHz is available and suitable

Next gen multi-gigabit Wi-Fi— spec’d up to 6.9 Gbps

© 2012 Cisco and/or its affiliates. All rights reserved. 21

21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Untrusted WiFi

Access: Limited

Secure

Mobility

• Seamless

connectivity as

you move

• Always on or

on-demand

VPN

• Endpoint

posture

assessment

• Split tunneling

Seamless

Anywhere

Access

© 2012 Cisco and/or its affiliates. All rights reserved. 22

One Management

One Policy

One Network

© 2012 Cisco and/or its affiliates. All rights reserved. 23

Single Business Policy

Context-Based Control

User-Specific Services

One Policy

Comprehensive Visibility

Operational Efficiency

Lower TCO

One Management

One Network

Uncompromised Experience

Resiliency and Scale

Deployment Flexibility

© 2012 Cisco and/or its affiliates. All rights reserved. 24

24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Workspace

Productivity

• Maximize

productivity

• All-in-one tools

• Ability to

collaborate on

any device

• Optimized

voice and

video

Collaboration on

Any Device

Work Home

Play

© 2012 Cisco and/or its affiliates. All rights reserved. 25

Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

© 2012 Cisco and/or its affiliates. All rights reserved. 26

• Validated technology to

make

sure it all works

• End-to-end support is

critical

• Ensure that the solution

can stay relevant through

technology roadmaps

and refreshes

• Ability to span the use

case spectrum

Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

© 2012 Cisco and/or its affiliates. All rights reserved. 27

Where are You on Your BYOD Journey?

Focus on basic services, easy access,

almost anybody

Broader Device

Types

But Internet Only Edu Environments

Public Institutions

Simple Guest

Enabled differentiated services, on-boarding

with security onsite/offsite

Multiple Device

Types + Access

Methods Healthcare

Early BYOD Adopters

Contractor Enablement

Environment requires tight controls

Corp Only Device

Mfg Environment

Trading Floor

Classified Gov Networks

Traditional Enterprise

Corp native apps, new services, full control

Multiple Device

Types,

Corp Issued Innovative Enterprises

Retail on Demand

Mobile Sales Services

(Video, Collaboration,

etc.)

Limit Advanced Enhanced Basic

© 2012 Cisco and/or its affiliates. All rights reserved. 28

A Comprehensive BYOD Approach

Uniquely Cisco—only Cisco

can deliver:

• End-to-end framework of

technology including services,

security, network and productivity

tools at each layer

• Best-of-breed technology with

Gartner Magic Quadrant

leadership at each layer

• Comprehensive workspace vision

across virtual and native

Workspace

Management

Security Mobility

Policy Management

Core Infrastructure

Workspace

Productivity Apps

© 2012 Cisco and/or its affiliates. All rights reserved. 29

Self Service

Private Apps

Store

Cloud

Storage

HTML 5

Enterprise Apps

Devices Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

Turn

key s

erv

ices a

nd s

upport

, valid

ate

d

desig

ns,

investm

ent

pro

tection

© 2012 Cisco and/or its affiliates. All rights reserved. 30

38% fewer cases

*2 year comparison

101% more devices 58% more users

300% more data usage

28% higher satisfaction

33% lower per user cost

© 2012 Cisco and/or its affiliates. All rights reserved. 31

Innovation

• Increase agility

• Increase

connectivity

and

productivity

• Drive new

business

models

• Maintain

business

relevance

• Attract and

retain

employees

• Speed time to

market

Winning with

Innovation

top related