Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user....
Transcript of Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user....
![Page 1: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/1.jpg)
Cisco IT’s experience in enabling mobile collaboration
Fred Fung
Director IT
Theater Leader - Asia and Greater China
![Page 2: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/2.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Cisco IT Defines Collaboration
Social Expertise and information location, proactive customer interaction
Content Text, voice, video that is most relevant to the user. Context aware. Findability is key.
Video High-quality interaction from anywhere, real time and offline
Bus. Apps/Store Easy and intuitive access to transaction systems
Mobile Secure access to information
and people from any device,
anywhere
![Page 3: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/3.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolution of our “Social Enterprise”
RSS Discussion Forums
Virtual Meetings
Wikis Blogs Video Sharing
Unified Communications
Social Bookmarking
IM
Platform Building Blocks
Tandberg Communities TelePresence ID Management
Phone Voicemail
Search
3
![Page 4: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/4.jpg)
BEFORE AFTER
Transforming Cisco’s User Experience
4
![Page 5: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/5.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WebEx Social—Tiered Value
Personal Productivity
• Faster time to task completion
• Less Steps, fewer clicks
• Reduced travel
Process Value
• Reduced process latency
• Lower travel costs
• Fewer overruns and delays
Transformational Value
• Time to market for new products
• Customer satisfaction
• Time to employee effectiveness
• Sales cycle time Tier 3
Tier 2
Tier 1
![Page 6: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/6.jpg)
Access from Any Device…
6
![Page 7: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/7.jpg)
Your Future Workforce!
Students and Their Notebooks at the University of Missouri School of Journalism
![Page 8: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/8.jpg)
Cisco IT BYOD Roadmap
8
2009
Mobile BYOD Mandate
Mobile Mail and Wi-Fi on iPhone, BlackBerry, Android, etc.
2010-2011
Tablet Support
AnyConnect on Trusted Devices
2012
Virtual desktop on VXI endpoints, laptops, smartphones & tablets
Mobile Apps
2013+
BYOD for non-Cisco laptops
2003-2008
Corporate-Paid Devices
Good Mobile Client
![Page 9: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/9.jpg)
Cisco’s Current Device Landscape
BYO Mobile Devices
12,060 25,032 6,994 8,705 Other 958
Traditional Corporate Laptops
26,333 7,416 95,766 2,067
Corporate VXI Endpoints
![Page 10: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/10.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobility is More Than Just BYOD
•Any Trusted Device
•Industry Standard Platforms
•Cisco AnyConnect and MDM
•Pervasive Wireless and ISE
Scaled Architecture
•BYOD-Only Smartphones and Tablets
•Corporate Laptops
•Corporate and Personal Service
•Strong Rules of Use
Flexible Liability
•Global relationships
•Pro-active cost optimization strategies
•Industry-first pricing models
Service Providers
•Demand Progression
•Enterprise and LOB Selection
•Future Enterprise Store
Robust App Lifecycle
•Self-Service Content
•One to Many Interactive
•Traditional One to One
•Proactive Communications
Social Support
Cisco IT Mobility Strategy
![Page 11: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/11.jpg)
Defining The Policy • Designing the right policies is critical to
controlling costs - 86% of BYOD costs are non-device-related
• IT should drive the policy design however buy-in needed from HR, Finance, Tax, Legal, and Corporate Security
• Policy must define minimum acceptable standards for Hardware, Operating System, and Security software
• A clear entitlement policy is necessary to ensure the right tools and services are offered to the right users for the right cost
• Rules of Use are necessary to set clear expectations around user behaviours
![Page 12: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/12.jpg)
BYOD Rules of Use
• All users must accept rules of use when signing up for service
• Trade off between employee trust and IT control
• There is no IT jargon – the rules are simple for end-users to understand
12
Cisco Rules of Use
1) Allows Cisco to remotely wipe the device
2) Requires an acceptable password and 10 minute timeout
3) Require users to immediately report a lost or stolen device.
![Page 13: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/13.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evolving Our Policies
Is this a tablet or a
laptop?
What about
this Surface?
Should we enforce a
PIN on your Galaxy
Camera?
How about remote wiping
your car?
This is great for
presentations, but
what about
watching movies
at work?
![Page 14: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/14.jpg)
Right Solution for the Right Situation
• Major Issue
• Requires High-Level Expertise
• Time Sensitive Call
• Minor Issue
• Requires Some Expertise
• Not Time Sensitive
Open a Case Online
• General Information
• How To
• Availability
Self Support
![Page 15: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/15.jpg)
Network
Edge
Core
Network
Security Model for Remote Access
4 Digit
PIN
10 Minute
Timeout
Remote
Wipe
Management
Encryption
![Page 16: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/16.jpg)
User/device
authentication
Posture assessment
Policy enforcement
Context aware
access control
Secure remote
access
Threat defense
Web usage policy
Web application
Device inventory
Device provisioning/
de-provisioning
Device data security
Device application
security
Cost management
Full or selective device
remote wipe
MDM is a key element but there is more
MDM Partners Cisco
ISE AnyConnect ASA ScanSafe WSA
User/device
authentication
Posture assessment
Policy enforcement
Context aware
access control
Secure remote
access
Threat defense
Web usage policy
Web application
DLP
![Page 17: Cisco IT’s experience in enabling · Text, voice, video that is most relevant to the user. Context aware. Findability ... Scaled Architecture •BYOD-Only Smartphones and Tablets](https://reader033.fdocuments.in/reader033/viewer/2022050306/5f6eb0763df56d7a9b489e87/html5/thumbnails/17.jpg)
TOMORROW starts here.