SlideShare a Scribd company logo
1 of 27
Five Essentials of BYOD
 Delivering Flexibility and Control in your business

  John-Paul Sikking
  Cisco Security Specialist


© 2012 Cisco and/or its affiliates. All rights reserved.
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   1
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   2
LIMIT                                BASIC                ENHANCED                   ADVANCED
            Environment                                      Focus on Basic        Enable Differentiated    Corp Native Applications,
       Requires Tight Controls                                  Services,         Services, On-Boarding          New Services,
                                                              Easy Access            with Security—               Full Control
                                                                                      Onsite/Offsite



               Corp Only Device                            Broader Device Types   Multiple Device Types +       Any Device, Any
                                                             but Internet Only       Access Methods               Ownership


© 2012 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Public   3
Reactive/Proactive
                                                           Security & Compliance
                                                           Legal requirements / Privacy
                                                           Data Protection and Integrity
                                                           Social Media
                                                           Cloud
                                                           Mobility
                                                           Application access and control
                                                           Acceptable Use
                                                           Insurance/purchasing/tax
                                                           Visibility and control...
© 2012 Cisco and/or its affiliates. All rights reserved.                                   Cisco Public   4
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   5
Applications


                                      Identity and Policy                         Management


                             Unified Network Access                        Security and Remote Access


                                 BYOD Building Blocks with *Cisco® SecureX
© 2012 Cisco and/or its affiliates. All rights reserved.                                           Cisco Public   6
Unified Network Access




© 2012 Cisco and/or its affiliates. All rights reserved.           Cisco Public   7
Cisco Mobility Technology for High Performance Wireless Network
               CleanAir                                    ClientLink 2.0             AVC                 AP 3600



           Improved                                           Improved           Application            Access Point
          Performance                                        Performance         Visibility and          Innovation
                                                                                    Control
     Proactive and                                            Proactive and                               The Tablet
 automatic interference                                      automatic beam      Control wireless       AP, enhanced
       mitigation                                          forming for 802.11n      traffic by         throughput and
                                                            and legacy clients    Application.      coverage for advanced
                                                                                                    applications for tablets
                                                                                                      and smart devices
                                      Identity Services Engine (ISE)—Unified Policy Management
                                                 Prime Infrastructure —Central Network Management
© 2012 Cisco and/or its affiliates. All rights reserved.                                                          Cisco Public   9
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   10
Broad…
      … classification
      of all traffic
      1,000+ apps

      MicroApp Engine
      Deep classification
      of targeted traffic
      75,000+ MicroApps


     App Behavior
    Control user interaction
    with the application


© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   11
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   12
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   13
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   14
Identity Services Engine for Advanced Policy Management

      IDENTITY                                                                                                                               PROFILING
                                                                 1
                                                                                                  ISE                                              HTTP
                                                            802.1x EAP                                                                         NETFLOW
                                                               User
                                                           Authentication                                                                         SNMP
                                                                              2                                VLAN 10                              DNS
                                                                                                               VLAN 20                           RADIUS
                                                                            Profiling to                           Policy
                                                             Company        identify device                       Decision           Corporate    DHCP
                                                              asset                                                  4               Resources
                            HQ
                                                                                              Wireless LAN
                                                                               Single SSID     Controller
                                                                                                                                 Internet Only
                          2:38pm
                                                             Personal                3                                       5
                                                              asset              Posture                            Enforce policy
                                                                              of the device   Unified Access        in the network       6    Full or partial
                                                                                               Management                                     access granted


© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                               Cisco Public   15
5 Dimensions of Policy
    User(Who)                                Device (What)           Access      Location        Time (When)
                                                                     (Which)                                        Policy
                                                                                 (Where)
                                                                                 Conference           M–S        Captive Portal
             Guest                               Personal Device     Wireless
                                                                                   Rooms           8 am–6 pm    DMZ Guest Tunnel
                                                                                                                  Guest VLAN

                                                       Contractor                  Contractor
         Contractor                                                   Wired                         Anytime     Contractor VLAN
                                                        Device                      cubicles
                                                                                   No HR or           M–S          Contractor
                                                 Personal Device     Wireless
                                                                                Finance spaces     8 am -6 pm        ACL
                                                                                                                   Employee
         Employee                               Corporate Device      Wired       Anywhere          Anytime
                                                                                                                    VLAN
                                                 Personal Device                                                   Employee
                                                                     Wireless     Anywhere          Anytime
                                                                                                                     ACL
                                                                       VPN                          Anytime




                                                            IF $Identity AND $Device AND $Access
© 2012 Cisco and/or its affiliates. All rights reserved.
                                                           AND $Location AND $Time THEN $Policy                       Cisco Public   16
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   17
Unified Access




Single Pane of Glass View and Management of WLAN – LAN - WAN
                                                       AFTER
              BEFORE                  Comprehensive user and Unified Access network
                             Separated management                              Visibility & advanced troubleshooting
                 WLAN
                                                                 Improved
                                                    LAN
                                                                  Visibility                                     WLAN
                                                                                                                 LAN
                                                           WAN                                                   WAN
                                                                                                                   +
                                                                                                                 Identity

             Siloed Inefficient Operational Model                               Simple Improves IT efficiency
             Repetitive Manual correlation of data                              Unified Single view of all user access data
             Error Prone Consumes time and resources                            Advanced Troubleshooting Less time
                                                                                and resources consumed
       Cisco Prime Infrastructure – Provides Unparalleled Visibility
© 2012 Cisco and/or its affiliates. All rights reserved.                                                           Cisco Public   18
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   19
Partner with Top MDM and Gen-i for a Complete Solution
                                       Initial Vendors Managed Mobility services
                                                   Gen-i



                                       Initial Vendors     Initial Vendors




                                                           Others Vendors




© 2012 Cisco and/or its affiliates. All rights reserved.                           Cisco Public   20
MDM is a Key Element—But There is More

                  MDM Partners                                                          Cisco
                                                            User and device       Threat defense     Secure remote
         Device inventory                                   authentication                             access
                                                                                   Web use policy
         Device provisioning                               Classification &
          and de-provisioning                                                      Web application
                                                             Profiling              DLP
         Device data security                              Policy enforcement
         Device application                                Context-aware
          security                                           access control
         Cost management
         Full or selective device                                 ISE                                  AnyConnect ASA
                                                                                  ScanSafe ESA/WSA
          remote wipe




© 2012 Cisco and/or its affiliates. All rights reserved.                                                           Cisco Public   21
New Features for Zero Touch On-Boarding




         Reduced Burden                                    Reduced Burden on                 Self Service
           on IT Staff                                       Help Desk Staff                    Model
    Device On-Boarding, Self                              Seamless Intuitive End User   My Device Registration
      Registration, Supplicant                                   Experience                 Portal, Guest
© 2012 Cisco and/orProvisioning
                   its affiliates. All rights reserved.                                  Sponsorship Portal
                                                                                                        Cisco Public   22
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   23
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   24
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   25
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   26
Applications                                     WebEx          Jabber




                                              Management                                         Prime Infrastructure



                                                                                                     ISE
                                      Identity and Policy


                     Security and Remote Access                                 AnyConnect        ScanSafe          WSA            ASA



                                                                           Router Router           Wireless                Wired
                             Unified Network Access
       Devices
       Layer                               SMARTPHONES
                                                              TABLETS   GAME/PRINTER       THIN/VIRTUAL    DESKTOP/NOTEBOOKS
© 2012 Cisco and/or its affiliates. All rights reserved.                                     CLIENTS                     Cisco Public    27
Thank You

© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Public   28

More Related Content

What's hot

Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprisehypknight
 
Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1Naqiuddin Akmal
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridgeCarl Ford
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewallvfmindia
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la NubeMundo Contact
 
Clean airdepguidde
Clean airdepguiddeClean airdepguidde
Clean airdepguiddeRYOFENYX27
 
Smart + Connected Real Estate
Smart + Connected Real EstateSmart + Connected Real Estate
Smart + Connected Real EstateCisco Canada
 
ngtest_presentation_0418
ngtest_presentation_0418ngtest_presentation_0418
ngtest_presentation_0418techweb08
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkCisco Canada
 

What's hot (12)

Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
 
Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1Discovery routing switching_chapter1_part1
Discovery routing switching_chapter1_part1
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridge
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Vfm palo alto next generation firewall
Vfm palo alto next generation firewallVfm palo alto next generation firewall
Vfm palo alto next generation firewall
 
Seguridad en la Nube
Seguridad en la NubeSeguridad en la Nube
Seguridad en la Nube
 
Clean airdepguidde
Clean airdepguiddeClean airdepguidde
Clean airdepguidde
 
Smart + Connected Real Estate
Smart + Connected Real EstateSmart + Connected Real Estate
Smart + Connected Real Estate
 
ngtest_presentation_0418
ngtest_presentation_0418ngtest_presentation_0418
ngtest_presentation_0418
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Enhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your NetworkEnhancing and Operating Video Collaboration with your Network
Enhancing and Operating Video Collaboration with your Network
 

Viewers also liked

IDCC 1596 accord du 18 avril 2016 IPD
IDCC 1596 accord du 18 avril 2016 IPDIDCC 1596 accord du 18 avril 2016 IPD
IDCC 1596 accord du 18 avril 2016 IPDSociété Tripalio
 
расписание ноябрь четверг
расписание ноябрь четверграсписание ноябрь четверг
расписание ноябрь четвергDemanessa
 
CXGGCA001_Constancia_-_Reconocimiento_centrumx
CXGGCA001_Constancia_-_Reconocimiento_centrumxCXGGCA001_Constancia_-_Reconocimiento_centrumx
CXGGCA001_Constancia_-_Reconocimiento_centrumxVictor Molina
 
เรียน ครูผู้สอนทุกท่าน
เรียน  ครูผู้สอนทุกท่านเรียน  ครูผู้สอนทุกท่าน
เรียน ครูผู้สอนทุกท่านsomsrichandaeng
 
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en español
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en españolLearn Spanish with Fresh Spanish: Expresar y contrastar gustos en español
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en españolFresh Spanish
 
Insertar Gadget en blogger
Insertar Gadget en bloggerInsertar Gadget en blogger
Insertar Gadget en bloggerPaz Gonzalo
 
Comment parler des prophètes?
Comment parler des prophètes?Comment parler des prophètes?
Comment parler des prophètes?IESH de Paris
 
Locandina a.s. 2017 2018 Zanellato
Locandina a.s. 2017 2018 ZanellatoLocandina a.s. 2017 2018 Zanellato
Locandina a.s. 2017 2018 Zanellatoesterbesusso
 
Organizational patterns for speeches
Organizational patterns for speechesOrganizational patterns for speeches
Organizational patterns for speechesjmillspaugh
 
A project report on Airtel
A project report on AirtelA project report on Airtel
A project report on AirtelRahul Soni
 
Portalsymposium City&Bits - Online-Redaktion in Kommunalverwaltungen
Portalsymposium City&Bits - Online-Redaktion in KommunalverwaltungenPortalsymposium City&Bits - Online-Redaktion in Kommunalverwaltungen
Portalsymposium City&Bits - Online-Redaktion in KommunalverwaltungenCity & Bits GmbH
 

Viewers also liked (18)

IDCC 1596 accord du 18 avril 2016 IPD
IDCC 1596 accord du 18 avril 2016 IPDIDCC 1596 accord du 18 avril 2016 IPD
IDCC 1596 accord du 18 avril 2016 IPD
 
Taylor swift
Taylor swiftTaylor swift
Taylor swift
 
Flugblatt jal 001
Flugblatt jal 001Flugblatt jal 001
Flugblatt jal 001
 
Coursera 986VW74U9RLK
Coursera 986VW74U9RLKCoursera 986VW74U9RLK
Coursera 986VW74U9RLK
 
Diagrama
DiagramaDiagrama
Diagrama
 
Fono.equilibrio
Fono.equilibrioFono.equilibrio
Fono.equilibrio
 
расписание ноябрь четверг
расписание ноябрь четверграсписание ноябрь четверг
расписание ноябрь четверг
 
CXGGCA001_Constancia_-_Reconocimiento_centrumx
CXGGCA001_Constancia_-_Reconocimiento_centrumxCXGGCA001_Constancia_-_Reconocimiento_centrumx
CXGGCA001_Constancia_-_Reconocimiento_centrumx
 
GANODERMA LUCIDUM
GANODERMA LUCIDUMGANODERMA LUCIDUM
GANODERMA LUCIDUM
 
เรียน ครูผู้สอนทุกท่าน
เรียน  ครูผู้สอนทุกท่านเรียน  ครูผู้สอนทุกท่าน
เรียน ครูผู้สอนทุกท่าน
 
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en español
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en españolLearn Spanish with Fresh Spanish: Expresar y contrastar gustos en español
Learn Spanish with Fresh Spanish: Expresar y contrastar gustos en español
 
Insertar Gadget en blogger
Insertar Gadget en bloggerInsertar Gadget en blogger
Insertar Gadget en blogger
 
Comment parler des prophètes?
Comment parler des prophètes?Comment parler des prophètes?
Comment parler des prophètes?
 
Cine infantil
Cine infantilCine infantil
Cine infantil
 
Locandina a.s. 2017 2018 Zanellato
Locandina a.s. 2017 2018 ZanellatoLocandina a.s. 2017 2018 Zanellato
Locandina a.s. 2017 2018 Zanellato
 
Organizational patterns for speeches
Organizational patterns for speechesOrganizational patterns for speeches
Organizational patterns for speeches
 
A project report on Airtel
A project report on AirtelA project report on Airtel
A project report on Airtel
 
Portalsymposium City&Bits - Online-Redaktion in Kommunalverwaltungen
Portalsymposium City&Bits - Online-Redaktion in KommunalverwaltungenPortalsymposium City&Bits - Online-Redaktion in Kommunalverwaltungen
Portalsymposium City&Bits - Online-Redaktion in Kommunalverwaltungen
 

Similar to Express Data - BYOD

Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right NetworkCisco Canada
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsSyam Madanapalli
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & Moreceriumnetworks
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...Nur Shiqim Chok
 

Similar to Express Data - BYOD (20)

BYOD without Compromise
BYOD without CompromiseBYOD without Compromise
BYOD without Compromise
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right Network
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
Day 2 p3 - automation
Day 2   p3 - automationDay 2   p3 - automation
Day 2 p3 - automation
 
Day 2 p3 - automation
Day 2   p3 - automationDay 2   p3 - automation
Day 2 p3 - automation
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 

More from Gen-i

4G LTE Network Experience
4G LTE Network Experience4G LTE Network Experience
4G LTE Network ExperienceGen-i
 
The Importance of NZ’s Technology sector – a perspective from NZICT
The Importance of NZ’s Technology sector – a perspective from NZICTThe Importance of NZ’s Technology sector – a perspective from NZICT
The Importance of NZ’s Technology sector – a perspective from NZICTGen-i
 
1402 a craig mc gregor
1402 a craig mc gregor1402 a craig mc gregor
1402 a craig mc gregorGen-i
 
Leadership in the Global Market
Leadership in the Global MarketLeadership in the Global Market
Leadership in the Global MarketGen-i
 
How you can engage the future of business
How you can engage the future of businessHow you can engage the future of business
How you can engage the future of businessGen-i
 
IT Challenges
IT ChallengesIT Challenges
IT ChallengesGen-i
 
The Importance of the NZ Technology Sector
The Importance of the NZ Technology SectorThe Importance of the NZ Technology Sector
The Importance of the NZ Technology SectorGen-i
 
Engage the future of business
Engage the future of businessEngage the future of business
Engage the future of businessGen-i
 
Video Conferencing has finally come of age
Video Conferencing has finally come of ageVideo Conferencing has finally come of age
Video Conferencing has finally come of ageGen-i
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their DesksGen-i
 
Intelligent Storage
Intelligent StorageIntelligent Storage
Intelligent StorageGen-i
 
International IT Trends – Cloud and Beyond
International IT Trends – Cloud and BeyondInternational IT Trends – Cloud and Beyond
International IT Trends – Cloud and BeyondGen-i
 
Making Life Simple: Plug and Play Enterprise Computing
Making Life Simple: Plug and Play Enterprise ComputingMaking Life Simple: Plug and Play Enterprise Computing
Making Life Simple: Plug and Play Enterprise ComputingGen-i
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from HuaweiGen-i
 
The New Office
The New OfficeThe New Office
The New OfficeGen-i
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
BIZGO - Overview
BIZGO - OverviewBIZGO - Overview
BIZGO - OverviewGen-i
 
Whangarei speaker ppt
Whangarei speaker pptWhangarei speaker ppt
Whangarei speaker pptGen-i
 

More from Gen-i (18)

4G LTE Network Experience
4G LTE Network Experience4G LTE Network Experience
4G LTE Network Experience
 
The Importance of NZ’s Technology sector – a perspective from NZICT
The Importance of NZ’s Technology sector – a perspective from NZICTThe Importance of NZ’s Technology sector – a perspective from NZICT
The Importance of NZ’s Technology sector – a perspective from NZICT
 
1402 a craig mc gregor
1402 a craig mc gregor1402 a craig mc gregor
1402 a craig mc gregor
 
Leadership in the Global Market
Leadership in the Global MarketLeadership in the Global Market
Leadership in the Global Market
 
How you can engage the future of business
How you can engage the future of businessHow you can engage the future of business
How you can engage the future of business
 
IT Challenges
IT ChallengesIT Challenges
IT Challenges
 
The Importance of the NZ Technology Sector
The Importance of the NZ Technology SectorThe Importance of the NZ Technology Sector
The Importance of the NZ Technology Sector
 
Engage the future of business
Engage the future of businessEngage the future of business
Engage the future of business
 
Video Conferencing has finally come of age
Video Conferencing has finally come of ageVideo Conferencing has finally come of age
Video Conferencing has finally come of age
 
Free Your Users from Their Desks
Free Your Users from Their DesksFree Your Users from Their Desks
Free Your Users from Their Desks
 
Intelligent Storage
Intelligent StorageIntelligent Storage
Intelligent Storage
 
International IT Trends – Cloud and Beyond
International IT Trends – Cloud and BeyondInternational IT Trends – Cloud and Beyond
International IT Trends – Cloud and Beyond
 
Making Life Simple: Plug and Play Enterprise Computing
Making Life Simple: Plug and Play Enterprise ComputingMaking Life Simple: Plug and Play Enterprise Computing
Making Life Simple: Plug and Play Enterprise Computing
 
4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei4G LTE Network – an update from Huawei
4G LTE Network – an update from Huawei
 
The New Office
The New OfficeThe New Office
The New Office
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
BIZGO - Overview
BIZGO - OverviewBIZGO - Overview
BIZGO - Overview
 
Whangarei speaker ppt
Whangarei speaker pptWhangarei speaker ppt
Whangarei speaker ppt
 

Express Data - BYOD

  • 1. Five Essentials of BYOD Delivering Flexibility and Control in your business John-Paul Sikking Cisco Security Specialist © 2012 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
  • 2. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
  • 3. LIMIT BASIC ENHANCED ADVANCED Environment Focus on Basic Enable Differentiated Corp Native Applications, Requires Tight Controls Services, Services, On-Boarding New Services, Easy Access with Security— Full Control Onsite/Offsite Corp Only Device Broader Device Types Multiple Device Types + Any Device, Any but Internet Only Access Methods Ownership © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
  • 4. Reactive/Proactive Security & Compliance Legal requirements / Privacy Data Protection and Integrity Social Media Cloud Mobility Application access and control Acceptable Use Insurance/purchasing/tax Visibility and control... © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
  • 6. Applications Identity and Policy Management Unified Network Access Security and Remote Access BYOD Building Blocks with *Cisco® SecureX © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. Unified Network Access © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
  • 8. Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 AVC AP 3600 Improved Improved Application Access Point Performance Performance Visibility and Innovation Control Proactive and Proactive and The Tablet automatic interference automatic beam Control wireless AP, enhanced mitigation forming for 802.11n traffic by throughput and and legacy clients Application. coverage for advanced applications for tablets and smart devices Identity Services Engine (ISE)—Unified Policy Management Prime Infrastructure —Central Network Management © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 10. Broad… … classification of all traffic 1,000+ apps MicroApp Engine Deep classification of targeted traffic 75,000+ MicroApps App Behavior Control user interaction with the application © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
  • 11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
  • 13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
  • 14. Identity Services Engine for Advanced Policy Management IDENTITY PROFILING 1 ISE HTTP 802.1x EAP NETFLOW User Authentication SNMP 2 VLAN 10 DNS VLAN 20 RADIUS Profiling to Policy Company identify device Decision Corporate DHCP asset 4 Resources HQ Wireless LAN Single SSID Controller Internet Only 2:38pm Personal 3 5 asset Posture Enforce policy of the device Unified Access in the network 6 Full or partial Management access granted © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
  • 15. 5 Dimensions of Policy User(Who) Device (What) Access Location Time (When) (Which) Policy (Where) Conference M–S Captive Portal Guest Personal Device Wireless Rooms 8 am–6 pm DMZ Guest Tunnel Guest VLAN Contractor Contractor Contractor Wired Anytime Contractor VLAN Device cubicles No HR or M–S Contractor Personal Device Wireless Finance spaces 8 am -6 pm ACL Employee Employee Corporate Device Wired Anywhere Anytime VLAN Personal Device Employee Wireless Anywhere Anytime ACL VPN Anytime IF $Identity AND $Device AND $Access © 2012 Cisco and/or its affiliates. All rights reserved. AND $Location AND $Time THEN $Policy Cisco Public 16
  • 16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
  • 17. Unified Access Single Pane of Glass View and Management of WLAN – LAN - WAN AFTER BEFORE Comprehensive user and Unified Access network Separated management Visibility & advanced troubleshooting WLAN Improved LAN Visibility WLAN LAN WAN WAN + Identity Siloed Inefficient Operational Model Simple Improves IT efficiency Repetitive Manual correlation of data Unified Single view of all user access data Error Prone Consumes time and resources Advanced Troubleshooting Less time and resources consumed Cisco Prime Infrastructure – Provides Unparalleled Visibility © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
  • 18. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
  • 19. Partner with Top MDM and Gen-i for a Complete Solution Initial Vendors Managed Mobility services Gen-i Initial Vendors Initial Vendors Others Vendors © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
  • 20. MDM is a Key Element—But There is More MDM Partners Cisco  User and device  Threat defense  Secure remote  Device inventory authentication access  Web use policy  Device provisioning  Classification & and de-provisioning  Web application Profiling DLP  Device data security  Policy enforcement  Device application  Context-aware security access control  Cost management  Full or selective device ISE AnyConnect ASA ScanSafe ESA/WSA remote wipe © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 21. New Features for Zero Touch On-Boarding Reduced Burden Reduced Burden on Self Service on IT Staff Help Desk Staff Model Device On-Boarding, Self Seamless Intuitive End User My Device Registration Registration, Supplicant Experience Portal, Guest © 2012 Cisco and/orProvisioning its affiliates. All rights reserved. Sponsorship Portal Cisco Public 22
  • 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
  • 26. Applications WebEx Jabber Management Prime Infrastructure ISE Identity and Policy Security and Remote Access AnyConnect ScanSafe WSA ASA Router Router Wireless Wired Unified Network Access Devices Layer SMARTPHONES TABLETS GAME/PRINTER THIN/VIRTUAL DESKTOP/NOTEBOOKS © 2012 Cisco and/or its affiliates. All rights reserved. CLIENTS Cisco Public 27
  • 27. Thank You © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Public 28

Editor's Notes

  1. Building layers to support All the the Devices. Taking an architectural approach. Not building out Point solutions.Re-iterate the 5 points, through the show.
  2. Due to proliferation of web-based applications (all traversing ports 80 and 443) and the port-hopping nature of several applications like Skype, ports are no longer a good proxy for applications.“Next-generation” firewalls address this by offering application-based visibility and control. However, merely classifying an application is no longer enough either. Now you must identify the “micro-applications” being used within a bigger application, and make the access controls decision based on all of these inputs.ASA CX offers very granular controls that allow administrators to create firewall policies that match the nuanced business needs of today. ASA CX not only identifies 1,000+ applications, but also identifies 75,000+ micro applications, like Farmville on Facebook. These micro applications are bucketed into easy-to-use categories so that firewall administrators can easily allow / deny access to the relevant parts of the application, for example, on Facebook these micro applications are categorized into business, community, education, entertainment, games, and so on. Similarly, other applications like Google+, LinkedIn, Twitter, iTunes etc are also broken down into micro applications.In addition to micro applications, ASA CX also identifies the application behavior, that is, what action is the user taking within that application. As an example, the Facebook Videos category identifies whether the user is uploading, tagging or posting a video. So an administrator may allow users to view and tag videos, but not allow users to upload a video. You could also deny any postings from users, effectively making Facebook read-only.
  3. Common control point – MDM plus moreCall our what our partnership entails…call our roadmap
  4. Cisco’s Secure BYOD offers a complementary solution to the MDM vendors. PLEASE NOTE: There should be noMDM partnership discussions unless under NDA before March 20th, 2012. MDM deliver a great set of functionalities for smartphones and tablets only. They can: Do a device inventory Provision & de-provision devices Deliver data security Deliver device application security Cost management And enable full or selective wipeOne of the key element to know is that MDM solutions take full control of an employees owned to device to put it under managementCisco’s solution are complementary as they bring additional functionalities such as : User and device authentication, posture assessment, policy enforcement, contact aware controls with ISE Advanced web security and threat device with WSA and ScanSafe Secure Remote access with AnyConnectThe major difference is that we will address all kind of devices from printer, fax machines, laptops, smartphones, tablets…As you can see, Cisco Secure BYOD and MDM solutions are complementary and we are working on integration between the major MDM vendors and ISE to complete our storyTransition: Let’s now, put all the pieces together in a simple network diagram to show an example of how this blocks could be implemented
  5. Break out into two slides … “on-boarding differentiators (1.1MR) on second slide”
  6. Call to action – Come to the stand and have a look at a working BYOD network…