Transcript
Page 1: Enabling A Secure Mobile Enterprise

1© 2013 XIRRUS :: All Rights Reserved© 2013 XIRRUS :: All Rights Reserved

KOWSHIK BHATDIRECTOR OF PRODUCT MARKETING

ENABLING A SECURE MOBILE ENTERPRISE

Page 2: Enabling A Secure Mobile Enterprise

2© 2013 XIRRUS :: All Rights Reserved

ENTERPRISE IT LEADERS DILEMMA

Business priorities vs IT investments

Internal Drivers

• Support BYOD

• Increase productivity

• Manage risk

External Drivers

• New mobile services

• Customer retention

• Comply with regulations

Security/Risk

• Flexibility

• Protecting business

Operations

• Simplicity

• Ease of deployment

………while the basic means of application service delivery and access is changing

Page 3: Enabling A Secure Mobile Enterprise

3© 2013 XIRRUS :: All Rights Reserved

MOBILE DATA CONTINUES ITS GROWTH TRAJECTORY

Page 4: Enabling A Secure Mobile Enterprise

4© 2013 XIRRUS :: All Rights Reserved

MOBILITY DRIVES IT SPEND

IT spending in 2013 will exceed $2.1

trillion, up 5.7% from 2012.

Sales of smart mobile devices including smartphones and tablets will grow by 20%, generate 20% of all IT sales, and drive a whopping 57% of all IT market growth.

Page 5: Enabling A Secure Mobile Enterprise

5© 2013 XIRRUS :: All Rights Reserved

GROWTH IS CHALLENGING THE WIRELESS NETWORK

• Access network has historically been optimized for wired• Wireless has been a convenience with inconsistent user

experience • Wireless needs to take on “wired” characteristics

Page 6: Enabling A Secure Mobile Enterprise

6© 2013 XIRRUS :: All Rights Reserved

APPLICATIONS DEMAND INCREASED CAPACITY

Page 7: Enabling A Secure Mobile Enterprise

7© 2013 XIRRUS :: All Rights Reserved

Page 8: Enabling A Secure Mobile Enterprise

8© 2013 XIRRUS :: All Rights Reserved

Page 9: Enabling A Secure Mobile Enterprise

9© 2013 XIRRUS :: All Rights Reserved

BYOD MAKES THE PROBLEM WAY WORSE

WHAT DEVICE?HOW MANY DEVICES?

WHAT APPLICATIONS?FREQUENCY OF

USE?

UNKNOWN

Page 10: Enabling A Secure Mobile Enterprise

10© 2013 XIRRUS :: All Rights Reserved

CHANGING WLAN NEEDS

Yesterday

Wired first, wireless overlay

Static network edge

Simple firewalls based security

Vendor Management Interface

Disparate networks and services

Today

Wireless first, wired-like expectation

Performance-optimized mobile edge

Multi-layered security

Programmable APIs – single pain of glass

Unified networks with converged tools

Coverage based WLAN to performance based WLAN

Page 11: Enabling A Secure Mobile Enterprise

11© 2013 XIRRUS :: All Rights Reserved© 2013 XIRRUS :: All Rights Reserved

VIEW THE FULL ON-DEMAND PRESENTATION

HTTP://WWW.XIRRUS.COM/WEBINAR