31
How You Can Achieve BYOD without Compromise Paul Durzan Director of Business Development Cisco

How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

How You Can Achieve BYOD without Compromise

Paul Durzan

Director of Business Development Cisco

Page 2: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 2 © 2012 Cisco and/or its affiliates. All rights reserved. 2

BYOD Smart Solution Paul Durzan

Director, BYOD Smart Solution

For Network World, Sept. 27, 2012

Page 3: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 3

Wired Wireless

Page 4: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 4

Location/Device/Application Independent

Page 5: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 5

COLLEGE STUDENTS

AND

YOUNG

PROFESSIONALS

CONSIDER INTERNET A

FUNDAMENTAL

HUMAN RESOURCE

OF COLLEGE

STUDENTS

OF YOUNG

EMPLOYEES

AND

SAY THEY COULD NOT LIVE

WITHOUT THE INTERNET

Page 6: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 6

COLLEGE STUDENTS GLOBALLY

WOULD CHOOSE AN INTERNET

CONNECTION OVER A CAR

INTERNET CAR

Page 7: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 7

OF

STUDENTS

OF

EMPLOYEE

S

CITE A MOBILE DEVICE

(LAPTOP, SMARTPHONE,

TABLET) AS “THE MOST

IMPORTANT

TECHNOLOGY IN THEIR

LIVES.”

SMARTPHONES ARE POISED TO

SURPASS DESKTOPS AS THE

MOST PREVALENT TOOL FROM A

GLOBAL PERSPECTIVE

Page 8: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 8

BYOD is Already Popular with Employees

Smartphone

35%

Percent Currently Using Their Own

Source Yankee Group—June

2012

Laptop

53%

Tablet

7%

Page 9: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 9

of organizations will allow personal devices for work use. —Gartner 90%

Page 10: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 10

100% of IT is struggling to keep up with mobility trends.

—Gartner

Page 11: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 11

Do It All

Securely

Page 12: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 12

Operations—

Adding,

Managing,

Provisioning,

Servicing Devices

Loss Of Control

Device Security

Network Security

Not Knowing Who

Is on the Network

Compliance

Data Security

Page 13: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 13

Virtual Desktop plus

Enterprise

Collaborative

Applications

Virtual

Native or Web-Based

Applications, Securely

Native/Physical

INTELLIGENT

NETWORK

Hybrid Approach

Page 14: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 14

Sees All Traffic

Routes All Requests Sources All Data

Controls All Flows

Handles All Devices

Touches All Users

Shapes All Streams

Page 15: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 15

I Can Use iPads on My

Network

End User

Drive New Business Models

Increase Productivity

Business

Increase Agility Attract And Retain

Talent

Speed Time To Market

Simplify Operations

Mitigate Risk IT

Simple Approach

Comprehensive

Approach

I Need a Comprehensive BYOD Strategy

Page 16: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 16

16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Fingerprint Device

Authenticate User

Apply Corporate

Configuration

Enterprise Apps

Onboarding

• BYOD devices

begin un-

configured,

everything

must be added

• Automatically

onboard the

right device

and the right

person

• Contextual

policy and in

depth

fingerprinting

• Securely

profile and

provision

Right People and

Devices Have

Access to the

Right Information

Page 17: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 17

Secure

Access

• AAA

• Profiling and

provisioning

• Unified Policy

• Prevent

compromised

devices

• Policy

enforcement of

device type,

user, location

• Guest access -

an extension of

corporate

• Compliance

and visibility

Right People and

Devices Have

Access to the

Right Information

Truste

d Wi

F i

Truste

d Wi

F i

Access: Limited

Filtered EMR

Internet

Patient visit

tracking

Page 18: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 18

Secure

Devices

• Pin lock

protection

• Compliance

checks—is it

jail broken?

• Application

provisioning

and

management

• Data loss

prevention—

remote wipe,

containers

Manage and

Secure the

Device and

Workspace

Truste

d Wi

F i

Truste

d Wi

F i

Local and Remote

Wipe

Encryption and

Management

4 Digit PIN

10 Minute Timeout

Page 19: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 19

Truste

d Wi

F i

Truste

d Wi

F i

Workspace

Delivery

• Pervasive—

coverage for

density

• Predictable—

wireless an

extension of

wired

• Ability to

mitigate

negative

environments

• Ability to

optimize

delivery of

workspace

• One

management,

one network

Effective

Workspace

Delivery

Page 20: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 20

1997 2007 2003 1999

2

290 290

11

130

0

870

54

(24

)

6900

3500

*

1730

*

600

690

0

450

300

65

802.11

HT 802.11n 802.11b 802.11a/

g

VHT 802.11ac

Wave1

VHT 802.11ac

Wave2

* Assuming 160 MHz is available and suitable

Next gen multi-gigabit Wi-Fi— spec’d up to 6.9 Gbps

Page 21: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 21

21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Untrusted WiFi

Access: Limited

Secure

Mobility

• Seamless

connectivity as

you move

• Always on or

on-demand

VPN

• Endpoint

posture

assessment

• Split tunneling

Seamless

Anywhere

Access

Page 22: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 22

One Management

One Policy

One Network

Page 23: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 23

Single Business Policy

Context-Based Control

User-Specific Services

One Policy

Comprehensive Visibility

Operational Efficiency

Lower TCO

One Management

One Network

Uncompromised Experience

Resiliency and Scale

Deployment Flexibility

Page 24: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 24

24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Workspace

Productivity

• Maximize

productivity

• All-in-one tools

• Ability to

collaborate on

any device

• Optimized

voice and

video

Collaboration on

Any Device

Work Home

Play

Page 25: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 25

Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

Page 26: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 26

• Validated technology to

make

sure it all works

• End-to-end support is

critical

• Ensure that the solution

can stay relevant through

technology roadmaps

and refreshes

• Ability to span the use

case spectrum

Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

Page 27: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 27

Where are You on Your BYOD Journey?

Focus on basic services, easy access,

almost anybody

Broader Device

Types

But Internet Only Edu Environments

Public Institutions

Simple Guest

Enabled differentiated services, on-boarding

with security onsite/offsite

Multiple Device

Types + Access

Methods Healthcare

Early BYOD Adopters

Contractor Enablement

Environment requires tight controls

Corp Only Device

Mfg Environment

Trading Floor

Classified Gov Networks

Traditional Enterprise

Corp native apps, new services, full control

Multiple Device

Types,

Corp Issued Innovative Enterprises

Retail on Demand

Mobile Sales Services

(Video, Collaboration,

etc.)

Limit Advanced Enhanced Basic

Page 28: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 28

A Comprehensive BYOD Approach

Uniquely Cisco—only Cisco

can deliver:

• End-to-end framework of

technology including services,

security, network and productivity

tools at each layer

• Best-of-breed technology with

Gartner Magic Quadrant

leadership at each layer

• Comprehensive workspace vision

across virtual and native

Workspace

Management

Security Mobility

Policy Management

Core Infrastructure

Workspace

Productivity Apps

Page 29: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 29

Self Service

Private Apps

Store

Cloud

Storage

HTML 5

Enterprise Apps

Devices Manage and Secure the

Device and Workspace

Seamless Anywhere

Access

Right People and

Devices Have Access

to the Right Information

Effective Workspace

Delivery

Collaboration on Any

Device

Turn

key s

erv

ices a

nd s

upport

, valid

ate

d

desig

ns,

investm

ent

pro

tection

Page 30: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 30

38% fewer cases

*2 year comparison

101% more devices 58% more users

300% more data usage

28% higher satisfaction

33% lower per user cost

Page 31: How You Can Achieve BYOD without Compromise€¦ · •BYOD devices begin un-configured, everything must be added •Automatically onboard the right device and the right person •Contextual

© 2012 Cisco and/or its affiliates. All rights reserved. 31

Innovation

• Increase agility

• Increase

connectivity

and

productivity

• Drive new

business

models

• Maintain

business

relevance

• Attract and

retain

employees

• Speed time to

market

Winning with

Innovation