SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
Strategies for Delivering  Secure Wireless Guest Access
Cisco Mobility TV  Mobility TV Host Chris Kozup Marketing Manager,  Mobility Solutions, Cisco Scott Pope Manager,  Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada,  Cisco
Thank You for Joining Us Today ,[object Object],[object Object],[object Object]
Wireless in  the News
Cisco Mobility Express Solution  ,[object Object],Application-Based Access Points, Controllers, plus Application Servers Cisco Mobility Express Solution Controller-Based Access Points Plus Controllers Offer a Mobile Foundation for All Standalone Access Points Grow with Your Business Adapt to Your Level  of Sophistication
Cisco Empowers the  Wireless Branch Office  ,[object Object],Empowered Wireless  Branch Integrated 3G Wireless WAN ISR Wireless LAN
Cisco Wins TechTarget’s 2007 Gold Award  ,[object Object],Gold Award: Cisco WiSM/WLSM
Cisco Teams with the NBA  ,[object Object]
Upcoming Cisco Wireless Events ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Why Secure Guest Access? 1 Cisco on Cisco: Guest Access Case Study 2 Cisco’s Secure Wireless  Guest Access Solution 3
Business Trends  and Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source: WLAN Adoption Study, Forrester Research, 2006
Wireless Guest Access Is  Changing Business ,[object Object],Providing customers real-time product or service information for an enhanced, better informed  consumer experience Healthcare Allowing suppliers to place refill orders on the  premises to minimize inventory shortages Financial Enabling consultants to complete audits more accurately efficiently Carpeted  Office Providing secure access to business partners and consultants to ensure faster decision making and increased business agility
Cisco Mobility TV  Mobility TV Host Chris Kozup Marketing Manager,  Mobility Solutions, Cisco Scott Pope Manager,  Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada,  Cisco
Cisco on Cisco Guest Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Objectives and Constraints
Cisco on Cisco Guest Access Architecture WWW Guest Data Guest traffic tunneled in GRE BBSM “ hotspot.cisco.com” Employee  generates access code via portal Corporate Current – Layer 3 Architecture WWW Guest Data Guest traffic tunneled in GRE NAC Appliance “ hotspot.cisco.com” Corporate Planned – Strategic
Cisco on Cisco Wireless SSID Architecture Wireless voice SSID EAP-FAST authentication WPA encryption QoS Broadcast = NO Guest networking SSID Open authentication No encryption Broadcast = YES Two production data SSIDs EAP-FAST authentication CKIP encryption on one WPA encryption on the other Broadcast = NO Cisco wireless voice users Cisco wireless data users NON-Cisco, guest WLAN users Common SSID configuration for all access points
Cisco on Cisco Guest Usage Trends - Global ,[object Object],[object Object],[object Object],Guest Users
Cisco on Cisco Support Cost Analysis – FY 2007 $14,450 Support Case Cost ($25 per case) $162,450  or $0.71 per guest Total Support Cost $148,000 Tier 2/3 Support (Est. 1 FTE) 578 # IT Support Cases (Annual) 228,048 Number of Guest Codes (Annual) FY 2007 Support Cost of Hotspot.cisco.com $162,450 Cost of “Hotspot.cisco.com” (see above) $5,538,750 Cost Avoidance $5,701,200 Total cost of support ($25 x 228,048) 228,048 # of helpdesk calls required (without guest service) FY 2007 Support Cost Pre-Hotspot.cisco.com
Cisco on Cisco Hotspot Benefits   ,[object Object],[object Object],[object Object],Improved Turnaround ,[object Object],[object Object],Guest Experience ,[object Object],Staff Empowerment ,[object Object],Legal Protection ,[object Object],[object Object],Improved Security ,[object Object],Cost Avoidance
Mobility Services … Beyond Connectivity Security Guest Voice Location ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pervasive Wireless Network
Cisco Mobility TV  Mobility TV Host Chris Kozup Marketing Manager,  Mobility Solutions, Cisco Scott Pope Manager,  Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada,  Cisco
Types of Network Users Corporate Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Contractors/ Consultants Guest Users ,[object Object],[object Object],[object Object],Full Access Internet Only Cisco Guest Services Give You Control
Cisco Solutions for  Secure Guest Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Versatile Solutions for Diverse Deployment Environments Wireless Guest Access in Cisco Unified Wireless Enhanced Wired and  Wireless Guest Access Core and Enhanced Options
Wireless Guest Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Wired/Wireless VLANs Campus Core LWAPP LWAPP WCS Ether IP “ Guest Tunnel” Emp Emp Internet Ether IP “ Guest Tunnel” DMZ WLAN Controller Guest Emp Guest Emp
Lobby Ambassador Feature ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enhanced Wired and Wireless  Guest Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Campus Core LWAPP LWAPP WCS Ether IP “ Guest Tunnel” Emp Emp Internet Ether IP “ Guest Tunnel” DMZ WLAN Controller NAC Appliance Wired/Wireless VLANs Guest Emp Guest Emp
Role-Based Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Implementation Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],Whatever the Business Reason for Guest Access, Implementation and Security Goals Should:
With Wireless… Now You Can
Now You Can… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 Networks
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Aruba, a Hewlett Packard Enterprise company
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...NetworkCollaborators
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sraMotty Ben Atia
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Zscaler
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New YearSavvius, Inc
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Torontopatmisasi
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?Phani Kumar
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Simplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationSimplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationCisco Enterprise Networks
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionF5 Networks
 

Mais procurados (20)

F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10F5 iHealth Presentation 10 22-10
F5 iHealth Presentation 10 22-10
 
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...Enhance network security with Multi-Factor Authentication for BYOD and guest ...
Enhance network security with Multi-Factor Authentication for BYOD and guest ...
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Sonicwall wireless & sra
Sonicwall wireless & sraSonicwall wireless & sra
Sonicwall wireless & sra
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517Webinar remote access_no_vpn_pitfalls_111517
Webinar remote access_no_vpn_pitfalls_111517
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Tune Up Your Network for the New Year
Tune Up Your Network for the New YearTune Up Your Network for the New Year
Tune Up Your Network for the New Year
 
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 TorontoF5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 
SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?SD WAN VS MPLS – Which is better for your Business?
SD WAN VS MPLS – Which is better for your Business?
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Simplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN ApplicationSimplify WAN Deployment with the Cisco IWAN Application
Simplify WAN Deployment with the Cisco IWAN Application
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module
 
BIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall SolutionBIG-IP Data Center Firewall Solution
BIG-IP Data Center Firewall Solution
 

Destaque

cisco case solve
cisco case solvecisco case solve
cisco case solveMoin Sarker
 
Cisco case study
Cisco case studyCisco case study
Cisco case studyKarn_Kumr
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewsolarisyougood
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of ITAyelet Baron
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 solarisyougood
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
 
Cisco Network Icon Library
Cisco Network Icon LibraryCisco Network Icon Library
Cisco Network Icon Librarymike_adolphs
 
Introduction and objectives of the project
Introduction and objectives of the projectIntroduction and objectives of the project
Introduction and objectives of the projectrihan696
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysisperk2624
 

Destaque (10)

cisco case solve
cisco case solvecisco case solve
cisco case solve
 
Cisco case study
Cisco case studyCisco case study
Cisco case study
 
Cisco case study
Cisco case studyCisco case study
Cisco case study
 
Cisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overviewCisco prime network 4.1 technical overview
Cisco prime network 4.1 technical overview
 
Measuring Business Value of IT
Measuring Business Value of ITMeasuring Business Value of IT
Measuring Business Value of IT
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
Cisco Network Icon Library
Cisco Network Icon LibraryCisco Network Icon Library
Cisco Network Icon Library
 
Introduction and objectives of the project
Introduction and objectives of the projectIntroduction and objectives of the project
Introduction and objectives of the project
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 

Semelhante a Secure Wireless Guest Access Strategies

Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsSleek International
 
Colubris Basic Customer Presentation
Colubris Basic Customer PresentationColubris Basic Customer Presentation
Colubris Basic Customer Presentationdaten
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P NsAamirAziz
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONERobb Boyd
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5Sen Nathan
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1Fiyaz Syed
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Squire Technologes: Session Border Controller
Squire Technologes: Session Border Controller Squire Technologes: Session Border Controller
Squire Technologes: Session Border Controller Squire Technologies
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidMyNOG
 
Miracle Smart Grid
Miracle Smart GridMiracle Smart Grid
Miracle Smart GridDavid White
 
IBM e-business Hosting Services
IBM e-business Hosting ServicesIBM e-business Hosting Services
IBM e-business Hosting Serviceswebhostingguy
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sonajayconde
 

Semelhante a Secure Wireless Guest Access Strategies (20)

Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Colubris Basic Customer Presentation
Colubris Basic Customer PresentationColubris Basic Customer Presentation
Colubris Basic Customer Presentation
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
TechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONETechWiseTV Workshop: Cisco ONE
TechWiseTV Workshop: Cisco ONE
 
Cross selling 5
Cross selling 5Cross selling 5
Cross selling 5
 
Iuwne10 S03 L04
Iuwne10 S03 L04Iuwne10 S03 L04
Iuwne10 S03 L04
 
Data Center Design Guide 4 1
Data Center Design Guide 4 1Data Center Design Guide 4 1
Data Center Design Guide 4 1
 
Manjesh cv
Manjesh cvManjesh cv
Manjesh cv
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Squire Technologes: Session Border Controller
Squire Technologes: Session Border Controller Squire Technologes: Session Border Controller
Squire Technologes: Session Border Controller
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 
Miracle Smart Grid
Miracle Smart GridMiracle Smart Grid
Miracle Smart Grid
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
IBM e-business Hosting Services
IBM e-business Hosting ServicesIBM e-business Hosting Services
IBM e-business Hosting Services
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 

Último

Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIBGregory DeShields
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good qualitycathy664059
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 

Último (20)

Paul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate ProfessionalPaul Turovsky - Real Estate Professional
Paul Turovsky - Real Estate Professional
 
Fundamentals Welcome and Inclusive DEIB
Fundamentals Welcome and  Inclusive DEIBFundamentals Welcome and  Inclusive DEIB
Fundamentals Welcome and Inclusive DEIB
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good quality
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 

Secure Wireless Guest Access Strategies

  • 1. Strategies for Delivering Secure Wireless Guest Access
  • 2. Cisco Mobility TV Mobility TV Host Chris Kozup Marketing Manager, Mobility Solutions, Cisco Scott Pope Manager, Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada, Cisco
  • 3.
  • 4. Wireless in the News
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Agenda Why Secure Guest Access? 1 Cisco on Cisco: Guest Access Case Study 2 Cisco’s Secure Wireless Guest Access Solution 3
  • 11.
  • 12.
  • 13. Cisco Mobility TV Mobility TV Host Chris Kozup Marketing Manager, Mobility Solutions, Cisco Scott Pope Manager, Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada, Cisco
  • 14.
  • 15. Cisco on Cisco Guest Access Architecture WWW Guest Data Guest traffic tunneled in GRE BBSM “ hotspot.cisco.com” Employee generates access code via portal Corporate Current – Layer 3 Architecture WWW Guest Data Guest traffic tunneled in GRE NAC Appliance “ hotspot.cisco.com” Corporate Planned – Strategic
  • 16. Cisco on Cisco Wireless SSID Architecture Wireless voice SSID EAP-FAST authentication WPA encryption QoS Broadcast = NO Guest networking SSID Open authentication No encryption Broadcast = YES Two production data SSIDs EAP-FAST authentication CKIP encryption on one WPA encryption on the other Broadcast = NO Cisco wireless voice users Cisco wireless data users NON-Cisco, guest WLAN users Common SSID configuration for all access points
  • 17.
  • 18. Cisco on Cisco Support Cost Analysis – FY 2007 $14,450 Support Case Cost ($25 per case) $162,450 or $0.71 per guest Total Support Cost $148,000 Tier 2/3 Support (Est. 1 FTE) 578 # IT Support Cases (Annual) 228,048 Number of Guest Codes (Annual) FY 2007 Support Cost of Hotspot.cisco.com $162,450 Cost of “Hotspot.cisco.com” (see above) $5,538,750 Cost Avoidance $5,701,200 Total cost of support ($25 x 228,048) 228,048 # of helpdesk calls required (without guest service) FY 2007 Support Cost Pre-Hotspot.cisco.com
  • 19.
  • 20.
  • 21. Cisco Mobility TV Mobility TV Host Chris Kozup Marketing Manager, Mobility Solutions, Cisco Scott Pope Manager, Guest Access Product Management, Cisco Tony Diep IT Theater Service Manager for US & Canada, Cisco
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.