41
1 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Government BYOD Challenge | GSF 2012 | Session 1-1

Embed Size (px)

DESCRIPTION

61% of all State/Local Government have a BYOD (Bring Your Own Device) Policy, or are developing a policy. Find out how to join the BYOD Challenge!

Citation preview

  • 1. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Agenda Connecting GOV in the Post-PC era Empowering IT and the User Explaining a BYOD+ framework Reference architecture, demonstration and multi-vendor discussionPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. 61% of State/Local Governments have a BYOD policy or are developing a policy. March 1, 2012Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Almost every major Federal department is responding 45 of all Federal employees use Mobile Apps to do their job. -InformationWeek Government %Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Classified AF Flight Guest ContractorNetworks Manuals Access Cisco Confidential 9
  • 10. Improve Protect performance my data with more users Consistent &EspeciallEspeciall y when simplified y whenits your policyits your USERS DEMAND: I WANT TOCHALLENGE: HOW DO I? ITExecutivExecutiv e e Onboard My Users Use the Device I 1 and Their Devices Want Seamless Enable Secure, Experience 2 Reliable Experience Across Devices Greater Flexibility Simplify Ongoing and Productivity 3 Operations 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Uncomplicated Simplified user experience policy controls Protects .GOV data Any device, any time, anywhere 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Trust eW i d F i Authenticate User Fingerprint Device Apply Government Config Government Apps Automatic PoliciesPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. 802.11n Wi-Fi Trust eW i d F i Identity- Based Access Control Apply defined policy profiles based on: Device Type Mobile User Device Location Managemen Application t WAN Optimization Service AssurancePresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Untrusted W i F i Access: Limited Government DataPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. T r us t Wid e Fi Access: FULL No Yes Government Private Cloud Mobile TelePresence Email Instant MessengerPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Untrusted W i F i Device remotely wiped Access: Limited Government Data Stolen iPadPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. One Scenario Four Results Uncomplicated user experience Simplified policy control Protects .GOV data Any device, any time, anywherePresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. One Scenario Four Results Uncomplicated user experience Simplified policy control Protects .GOV data Any device, any time, anywhere Additional requirements for GOV High performance wireless (incl. video over wireless) Makes IT life easier to manage and install Always-On Security Granular application control Secure connectivity to classified data Single pane of glass: Wired & WirelessPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. My users use multiple devices including their Granul Granul own; they are ar App ar App mobile and need Control Control Single Single IronPort IronPort role-based Pane Pane Directory Exchange Email Web access of of to the Internet glass glass and internal MDM Mgr apps. NCS Prime ISE MDM WLAN Alway Alway Controller s-On s-On NextGe NextGe CleanAir CSM/ASD Securi Securi n n M ty ty Encrypti Encrypti on on High High Performan Performan AC NAM ce ce AC VPN with Cloud Web Security Wireless Wireless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. My users use multiple devices including their own; they are mobile and need Video over wireless IronPort IronPort role-based Directory Exchange Email Web access Optimize wireless to the Internet capacity and reliability and internal Collaborate NCS Prime MDM Mgr apps. seamlessly ISE across devices Always-on security MDM Unify wired/wireless/mobile WLAN with a single VPN Controller client NextGen Encryption CleanAir CSM/ASD M Granular application control Single pane of glass Configure and enforce AC VPN with AC NAM consistent policies Cloud Web Security across branch, campus, and DC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. BEFORE AFTER Best-Effort Network Mobility-Optimized Experience AIR QUALITY PERFORMANC AIR QUALITY PERFORMANC E E ClientLink CleanAir VideoStream Unpredictable Difficulty supporting mobile Accelerated up to 30% faster for all clients devices Reliable Interference protection and diagnostics Difficult Connectivity issues from interference Optimized High performance multicast video Low Performance Spotty video performance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Web Security Mobile Device Cloud-based Security Security Encrypted Tunnel Mobile User Internet Caf Mobile User Internet 2011 Cisco and/or its affiliates. All rights reserved. Caf Cisco Confidential 23
  • 24. BEFORE AFTER Many Windows, Fragmented View Comprehensive User and Access Visibility Wireless Unified Management Identity Wireless Wired Wired Policy Siloed Inefficient Operational Model Simple Find and solve user problems fast Repetitive Manual correlation of data Unified View of all devices by user, across networks Error Prone Consumes time and resources Lower Opex More efficient use of IT resources 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. David white slide?Identity Services Engine (ISE) for Advanced Policy Management IDENTITY PROFILING 1 ISE HTTP 802.1x EAP NETFLOW User Authentication SNMP VLAN 10 DNS 2 VLAN 20 RADIUS Profiling to identify device Government DHCP Government asset Resources 4 GOV HQ Wireless LAN Single SSID Controller Policy Internet Only 2:38pm Decision Personal 3 5 asset 6 Posture Enforce policy in of the device the network Full or partial Unified Access Management access granted Applying granular access via Web Controls 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. What youll see in the demo Uncomplicated User Experience Flexible access (for user and IT) Simplified Policy Controls Reference architecturePresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
  • 27. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
  • 28. Access ControlSecure Wireless End Point Security
  • 29. SSID: ATCGuestSSID: ATCSecure
  • 30. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
  • 31. PssstWorkshops, Advanced Network Its FREE Assessments and Penetration Testing Services can provide: PLAN DESIGN IMPLEMENT SUPPORT Threat Identification, Probability and Analysis Infrastructure Analysis Advance Technology Capability Analysis Security Policy, Regulatory Compliance and Procedure Gap WORKSHOPS Analysis Active and/or Passive Tools to Evaluate your agencys network security Analyze the Infrastructure posture against industry standards for best An Executable Plan to Improve practices. A combination of network and the Agencys Security Posture security tools is used to gain a clearer picture of the infrastructure, policies, regulatory compliance and procedures in place today. You will receive tools along with reports providing specific recommendations to address vulnerabilities and improve your agencys overall security.
  • 32. No Spam We dont sell information Level Playing Field Only scan when you want to be Money doesnt buy scanned preference in the lab Technology speaks for itself No Cost to Attend Attend for free Lunch provided
  • 33. BYOD Tech Days http://www.cisco.com/web/go/semreg/byodsolutions Date Location Date Location 17-APR- Gold River, California, 08-MAY- Malvern, Pennsylvania, 2012 2012 18-APR- Richfield, Ohio, 09-MAY- Bloomington, MN, 2012 2012 19-APR- Boxborough, 09-MAY- Houston, Texas, 2012 Massachusetts 2012 02-MAY- Lawrenceville, Georgia, 15-MAY- Chesterfield, Missouri, 2012 2012 03-MAY- Irvine, California, 16-MAY- Richardson, Texas, 2012 2012 08-MAY- San Jose, California, 16-MAY- Herndon, Virginia, 2012 2012Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 34. Visit www.cisco.com/go/challenge Watch the 20-minute video featuring TechWise Jimmy Ray Purser and Robb Boyd with IKE Take the Challenge! Test your knowledge and answer 10 questions.Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 35. Various Ways to Approach the BYOD Challenge It is a wireless infrastructure problem It is a security problem and needs a security solution It is a device management problem It needs a virtualization solution Uncomplicated user It is a device problem and needs IT friendly devices experience Simplified policy control Protects .GOV data It is a Remote access problem Any device, any time, anywhere 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
  • 36. 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 38Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential EDCS-11279 38
  • 37. BEST-IN-CLASS TECHNOLOGY CONVERGED POLICY AND MANAGEMENT Optimized Experience on Who ? What ? Whe n? Where? How ? Mobility Wireless Client acceleration and optimized video protected by proactive spectrum ISE management Protecting Data in Motion Security Context-aware VPN and firewall, cloud- based email and content scanning Rich Experience Across NCS Collaboratio Devices for voice, video, and IM One platform across Cius, other mobile devices, n laptops 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 38. Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 39. Do you guys like this?SimplifiedAccessProductivityProductivityLogisticsSensorCollectionVirtualDesktopPresentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41