How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything...
Transcript of How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything...
![Page 1: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/1.jpg)
How You Can Achieve BYOD without Compromise
Paul Durzan
Director of Business Development Cisco
![Page 2: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/2.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 2 © 2012 Cisco and/or its affiliates. All rights reserved. 2
BYOD Smart Solution Paul Durzan
Director, BYOD Smart Solution
For Network World, Sept. 27, 2012
![Page 3: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/3.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 3
Wired Wireless
![Page 4: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/4.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 4
Location/Device/Application Independent
![Page 5: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/5.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 5
COLLEGE STUDENTS
AND
YOUNG
PROFESSIONALS
CONSIDER INTERNET A
FUNDAMENTAL
HUMAN RESOURCE
OF COLLEGE
STUDENTS
OF YOUNG
EMPLOYEES
AND
SAY THEY COULD NOT LIVE
WITHOUT THE INTERNET
![Page 6: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/6.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 6
COLLEGE STUDENTS GLOBALLY
WOULD CHOOSE AN INTERNET
CONNECTION OVER A CAR
INTERNET CAR
![Page 7: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/7.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 7
OF
STUDENTS
OF
EMPLOYEE
S
CITE A MOBILE DEVICE
(LAPTOP, SMARTPHONE,
TABLET) AS “THE MOST
IMPORTANT
TECHNOLOGY IN THEIR
LIVES.”
SMARTPHONES ARE POISED TO
SURPASS DESKTOPS AS THE
MOST PREVALENT TOOL FROM A
GLOBAL PERSPECTIVE
![Page 8: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/8.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 8
BYOD is Already Popular with Employees
Smartphone
35%
Percent Currently Using Their Own
Source Yankee Group—June
2012
Laptop
53%
Tablet
7%
![Page 9: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/9.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 9
of organizations will allow personal devices for work use. —Gartner 90%
![Page 10: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/10.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 10
100% of IT is struggling to keep up with mobility trends.
—Gartner
![Page 11: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/11.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 11
Do It All
Securely
![Page 12: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/12.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 12
Operations—
Adding,
Managing,
Provisioning,
Servicing Devices
Loss Of Control
Device Security
Network Security
Not Knowing Who
Is on the Network
Compliance
Data Security
![Page 13: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/13.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 13
Virtual Desktop plus
Enterprise
Collaborative
Applications
Virtual
Native or Web-Based
Applications, Securely
Native/Physical
INTELLIGENT
NETWORK
Hybrid Approach
![Page 14: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/14.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 14
Sees All Traffic
Routes All Requests Sources All Data
Controls All Flows
Handles All Devices
Touches All Users
Shapes All Streams
![Page 15: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/15.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 15
I Can Use iPads on My
Network
End User
Drive New Business Models
Increase Productivity
Business
Increase Agility Attract And Retain
Talent
Speed Time To Market
Simplify Operations
Mitigate Risk IT
Simple Approach
Comprehensive
Approach
I Need a Comprehensive BYOD Strategy
![Page 16: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/16.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 16
16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Fingerprint Device
Authenticate User
Apply Corporate
Configuration
Enterprise Apps
Onboarding
• BYOD devices
begin un-
configured,
everything
must be added
• Automatically
onboard the
right device
and the right
person
• Contextual
policy and in
depth
fingerprinting
• Securely
profile and
provision
Right People and
Devices Have
Access to the
Right Information
![Page 17: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/17.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 17
Secure
Access
• AAA
• Profiling and
provisioning
• Unified Policy
• Prevent
compromised
devices
• Policy
enforcement of
device type,
user, location
• Guest access -
an extension of
corporate
• Compliance
and visibility
Right People and
Devices Have
Access to the
Right Information
Truste
d Wi
F i
Truste
d Wi
F i
Access: Limited
Filtered EMR
Internet
Patient visit
tracking
![Page 18: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/18.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 18
Secure
Devices
• Pin lock
protection
• Compliance
checks—is it
jail broken?
• Application
provisioning
and
management
• Data loss
prevention—
remote wipe,
containers
Manage and
Secure the
Device and
Workspace
Truste
d Wi
F i
Truste
d Wi
F i
Local and Remote
Wipe
Encryption and
Management
4 Digit PIN
10 Minute Timeout
![Page 19: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/19.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 19
Truste
d Wi
F i
Truste
d Wi
F i
Workspace
Delivery
• Pervasive—
coverage for
density
• Predictable—
wireless an
extension of
wired
• Ability to
mitigate
negative
environments
• Ability to
optimize
delivery of
workspace
• One
management,
one network
Effective
Workspace
Delivery
![Page 20: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/20.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 20
1997 2007 2003 1999
2
290 290
11
130
0
870
54
(24
)
6900
3500
*
1730
*
600
690
0
450
300
65
802.11
HT 802.11n 802.11b 802.11a/
g
VHT 802.11ac
Wave1
VHT 802.11ac
Wave2
* Assuming 160 MHz is available and suitable
Next gen multi-gigabit Wi-Fi— spec’d up to 6.9 Gbps
![Page 21: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/21.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 21
21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Untrusted WiFi
Access: Limited
Secure
Mobility
• Seamless
connectivity as
you move
• Always on or
on-demand
VPN
• Endpoint
posture
assessment
• Split tunneling
Seamless
Anywhere
Access
![Page 22: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/22.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 22
One Management
One Policy
One Network
![Page 23: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/23.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 23
Single Business Policy
Context-Based Control
User-Specific Services
One Policy
Comprehensive Visibility
Operational Efficiency
Lower TCO
One Management
One Network
Uncompromised Experience
Resiliency and Scale
Deployment Flexibility
![Page 24: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/24.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 24
24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Workspace
Productivity
• Maximize
productivity
• All-in-one tools
• Ability to
collaborate on
any device
• Optimized
voice and
video
Collaboration on
Any Device
Work Home
Play
![Page 25: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/25.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 25
Manage and Secure the
Device and Workspace
Seamless Anywhere
Access
Right People and
Devices Have Access
to the Right Information
Effective Workspace
Delivery
Collaboration on Any
Device
![Page 26: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/26.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 26
• Validated technology to
make
sure it all works
• End-to-end support is
critical
• Ensure that the solution
can stay relevant through
technology roadmaps
and refreshes
• Ability to span the use
case spectrum
Manage and Secure the
Device and Workspace
Seamless Anywhere
Access
Right People and
Devices Have Access
to the Right Information
Effective Workspace
Delivery
Collaboration on Any
Device
![Page 27: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/27.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 27
Where are You on Your BYOD Journey?
Focus on basic services, easy access,
almost anybody
Broader Device
Types
But Internet Only Edu Environments
Public Institutions
Simple Guest
Enabled differentiated services, on-boarding
with security onsite/offsite
Multiple Device
Types + Access
Methods Healthcare
Early BYOD Adopters
Contractor Enablement
Environment requires tight controls
Corp Only Device
Mfg Environment
Trading Floor
Classified Gov Networks
Traditional Enterprise
Corp native apps, new services, full control
Multiple Device
Types,
Corp Issued Innovative Enterprises
Retail on Demand
Mobile Sales Services
(Video, Collaboration,
etc.)
Limit Advanced Enhanced Basic
![Page 28: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/28.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 28
A Comprehensive BYOD Approach
Uniquely Cisco—only Cisco
can deliver:
• End-to-end framework of
technology including services,
security, network and productivity
tools at each layer
• Best-of-breed technology with
Gartner Magic Quadrant
leadership at each layer
• Comprehensive workspace vision
across virtual and native
Workspace
Management
Security Mobility
Policy Management
Core Infrastructure
Workspace
Productivity Apps
![Page 29: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/29.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 29
Self Service
Private Apps
Store
Cloud
Storage
HTML 5
Enterprise Apps
Devices Manage and Secure the
Device and Workspace
Seamless Anywhere
Access
Right People and
Devices Have Access
to the Right Information
Effective Workspace
Delivery
Collaboration on Any
Device
Turn
key s
erv
ices a
nd s
upport
, valid
ate
d
desig
ns,
investm
ent
pro
tection
![Page 30: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/30.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 30
38% fewer cases
*2 year comparison
101% more devices 58% more users
300% more data usage
28% higher satisfaction
33% lower per user cost
![Page 31: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual](https://reader034.fdocuments.in/reader034/viewer/2022042915/5f52130439f83875525ccf93/html5/thumbnails/31.jpg)
© 2012 Cisco and/or its affiliates. All rights reserved. 31
Innovation
• Increase agility
• Increase
connectivity
and
productivity
• Drive new
business
models
• Maintain
business
relevance
• Attract and
retain
employees
• Speed time to
market
Winning with
Innovation