Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user....

17
Cisco IT’s experience in enabling mobile collaboration Fred Fung Director IT Theater Leader - Asia and Greater China

Transcript of Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user....

Page 1: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Cisco IT’s experience in enabling mobile collaboration

Fred Fung

Director IT

Theater Leader - Asia and Greater China

Page 2: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

How Cisco IT Defines Collaboration

Social Expertise and information location, proactive customer interaction

Content Text, voice, video that is most relevant to the user. Context aware. Findability is key.

Video High-quality interaction from anywhere, real time and offline

Bus. Apps/Store Easy and intuitive access to transaction systems

Mobile Secure access to information

and people from any device,

anywhere

Page 3: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Evolution of our “Social Enterprise”

RSS Discussion Forums

Virtual Meetings

Wikis Blogs Video Sharing

Unified Communications

Social Bookmarking

IM

Platform Building Blocks

Tandberg Communities TelePresence ID Management

Phone Voicemail

Search

3

Page 4: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

BEFORE AFTER

Transforming Cisco’s User Experience

4

Page 5: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

WebEx Social—Tiered Value

Personal Productivity

• Faster time to task completion

• Less Steps, fewer clicks

• Reduced travel

Process Value

• Reduced process latency

• Lower travel costs

• Fewer overruns and delays

Transformational Value

• Time to market for new products

• Customer satisfaction

• Time to employee effectiveness

• Sales cycle time Tier 3

Tier 2

Tier 1

Page 6: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Access from Any Device…

6

Page 7: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Your Future Workforce!

Students and Their Notebooks at the University of Missouri School of Journalism

Page 8: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Cisco IT BYOD Roadmap

8

2009

Mobile BYOD Mandate

Mobile Mail and Wi-Fi on iPhone, BlackBerry, Android, etc.

2010-2011

Tablet Support

AnyConnect on Trusted Devices

2012

Virtual desktop on VXI endpoints, laptops, smartphones & tablets

Mobile Apps

2013+

BYOD for non-Cisco laptops

2003-2008

Corporate-Paid Devices

Good Mobile Client

Page 9: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Cisco’s Current Device Landscape

BYO Mobile Devices

12,060 25,032 6,994 8,705 Other 958

Traditional Corporate Laptops

26,333 7,416 95,766 2,067

Corporate VXI Endpoints

Page 10: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Mobility is More Than Just BYOD

•Any Trusted Device

•Industry Standard Platforms

•Cisco AnyConnect and MDM

•Pervasive Wireless and ISE

Scaled Architecture

•BYOD-Only Smartphones and Tablets

•Corporate Laptops

•Corporate and Personal Service

•Strong Rules of Use

Flexible Liability

•Global relationships

•Pro-active cost optimization strategies

•Industry-first pricing models

Service Providers

•Demand Progression

•Enterprise and LOB Selection

•Future Enterprise Store

Robust App Lifecycle

•Self-Service Content

•One to Many Interactive

•Traditional One to One

•Proactive Communications

Social Support

Cisco IT Mobility Strategy

Page 11: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Defining The Policy • Designing the right policies is critical to

controlling costs - 86% of BYOD costs are non-device-related

• IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security

• Policy must define minimum acceptable standards for Hardware, Operating System, and Security software

• A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost

• Rules of Use are necessary to set clear expectations around user behaviours

Page 12: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

BYOD Rules of Use

• All users must accept rules of use when signing up for service

• Trade off between employee trust and IT control

• There is no IT jargon – the rules are simple for end-users to understand

12

Cisco Rules of Use

1) Allows Cisco to remotely wipe the device

2) Requires an acceptable password and 10 minute timeout

3) Require users to immediately report a lost or stolen device.

Page 13: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Evolving Our Policies

Is this a tablet or a

laptop?

What about

this Surface?

Should we enforce a

PIN on your Galaxy

Camera?

How about remote wiping

your car?

This is great for

presentations, but

what about

watching movies

at work?

Page 14: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Right Solution for the Right Situation

• Major Issue

• Requires High-Level Expertise

• Time Sensitive Call

• Minor Issue

• Requires Some Expertise

• Not Time Sensitive

Open a Case Online

• General Information

• How To

• Availability

Self Support

Page 15: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

Network

Edge

Core

Network

Security Model for Remote Access

4 Digit

PIN

10 Minute

Timeout

Remote

Wipe

Management

Encryption

Page 16: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

User/device

authentication

Posture assessment

Policy enforcement

Context aware

access control

Secure remote

access

Threat defense

Web usage policy

Web application

Device inventory

Device provisioning/

de-provisioning

Device data security

Device application

security

Cost management

Full or selective device

remote wipe

MDM is a key element but there is more

MDM Partners Cisco

ISE AnyConnect ASA ScanSafe WSA

User/device

authentication

Posture assessment

Policy enforcement

Context aware

access control

Secure remote

access

Threat defense

Web usage policy

Web application

DLP

Page 17: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets

TOMORROW starts here.