SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
© 2013 Beyond Mobile Ltd June 5, 2013
© 2013 Beyond Mobile Ltd June 5, 2013
INTRODUCTION
2
An	
  IT	
  infrastructure	
  specialist	
  with	
  over	
  20	
  years	
  in	
  the	
  
financial	
  services	
  sector.	
  	
  
	
  
11	
  years	
  with	
  Credit	
  Suisse	
  and	
  6	
  with	
  Chase	
  (JP	
  Morgan)	
  
	
  
Tough	
  environment	
  in	
  Financial	
  services	
  and	
  deparGng	
  a	
  
role	
  as	
  Director	
  in	
  IT	
  for	
  Credit	
  Suisse	
  to	
  start	
  Beyond	
  
Mobile.	
  
	
  
Beyond	
  Mobile	
  offers	
  Strategy,	
  Product	
  and	
  Sales	
  advice	
  to	
  
technology	
  companies	
  in	
  the	
  early	
  stage	
  of	
  their	
  business	
  
plans.	
  
© 2013 Beyond Mobile Ltd June 5, 2013 3
WHAT IS AN ENTERPRISE
© 2013 Beyond Mobile Ltd June 5, 2013 4
ALL THE SAME RIGHT !
© 2013 Beyond Mobile Ltd June 5, 2013
DeclaraGon	
   NX	
   Sovereign	
  
circa	
  2130s	
   April	
  16,	
  2151	
   October	
  30,	
  2372	
  
52,000	
  metric	
  tonnes	
   998,000	
  metric	
  tonnes	
   3,250,000	
  metric	
  tonnes	
  
300	
  metres	
   225	
  metres	
   685.7	
  metres 	
  	
  
	
  
	
  <	
  Warp	
  2	
   Warp	
  5.2	
   Warp	
  9.995	
  
None	
   Photonic	
  torpedoes	
  
Phase	
  cannons	
  
Arrays	
  Phasers	
  
USS	
  Enterprise	
  	
  
(XCV	
  330)	
  
NX01	
   NCC-­‐1701-­‐E	
  
5
COMPARISON STAR TREK ENTERPRISE
© 2013 Beyond Mobile Ltd June 5, 2013
Enterprise	
  1	
  
(Financial) 	
  	
  
Case	
  Study	
  
(Financial)	
  
Enterprise	
  3	
  
(consulGng)	
  
COMPARISON OF AN ENTERPRISE
6
120,000	
   65,000	
   20,000	
  
143,000	
   80,000	
   2,000	
  
28,000	
   15,000	
   20,000	
  
170,000	
   120,000	
   2,500	
  
Yes	
   Yes	
   No	
  
“dirty	
  network”	
  “clean	
  network”	
   “clean	
  network”	
  
© 2013 Beyond Mobile Ltd June 5, 2013
EVIL INTERNET & WIRELESS
7
Wi-Fi BANNED
Custom laptops with Wi-Fi cards
removed
Ethernet ports and drivers locked
down
Remote access restricted to dial up
Almost impossible to be productive
unless in the office	
  
© 2013 Beyond Mobile Ltd June 5, 2013
EVOLUTION NOT REVOLUTION
8
© 2013 Beyond Mobile Ltd June 5, 2013
NETWORK PERIMETER SECURITY
9
2007
© 2013 Beyond Mobile Ltd June 5, 2013
NETWORK PERIMETER SECURITY
10
© 2013 Beyond Mobile Ltd June 5, 2013
NETWORK STRATEGY
11
DEPERIMITISATION	
  
© 2013 Beyond Mobile Ltd June 5, 2013
2007 – 1ST GEN WI-FI
12
CISO concedes some Wi-Fi allowed
“Managed” endpoints only
Guest internet access allowed
No employee personal devices allowed
User experience not considered
Wi-Fi Design poor
Global inconsistency	
  
© 2013 Beyond Mobile Ltd June 5, 2013
2007 – 1ST GEN WI-FI
13
Un-provisioned
Device
Provisioned
Device
LAN DMZ
BYOD
MDPS
FWFW
EXT DMZ FWEXT DMZ FW
Wage
Firewall
Cisco DMZ
anchor
Controller
DMZ Bluecoat
Proxy
EoIP
PWR ENET 11A/N 11B/G/N
105
BYOD User traffic
EoIP
Radius Auth
HTTPS
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
APAC CPPM
AAA servers
EMEA CPPM
AAA Servers
Amigopod Appliance for
remote cloud provisioning
of BYOD and guest self
registration
Cisco Intranet
Controller
Guest traffic
Cisco Access
Point
© 2013 Beyond Mobile Ltd June 5, 2013
2009 CHALLENGERS
14
“Why can’t I use the corporate
Wi-Fi to sync my work email”
“Cellular coverage is so bad in my
building and it’s crazy employee’s
cant use the Corporate Wi-Fi on
their personal devices”
Crumbling of IT Walled gardens
© 2013 Beyond Mobile Ltd June 5, 2013
2011 THE GAME CHANGED
15
Real estate smart strategies
Wi-Fi shifted to a core “enabling” technology
and business enabler.
BYOD strategy was built demanding better
services
CIO – build it quick but I wouldn’t start from
there, if I was you
Poor coverage, low contention, IT vs. Business
© 2013 Beyond Mobile Ltd June 5, 2013
THE BEGINNING OR THE END?
16
Requirements
Stakeholder Management
Buy as a Service vs Build
Technical Design
Build
Lesson’s learnt
© 2013 Beyond Mobile Ltd June 5, 2013
REQUIREMENTS
17
Guest Standard Employee Complex Employee
Standard Complex
© 2013 Beyond Mobile Ltd June 5, 2013
Guest 	
  	
   Standard	
  Employee	
   Complex	
  Employee	
  
REQUIREMENTS
18
Medium	
   Medium	
   High	
  
Low	
   Med	
   High	
  /	
  Regulated	
  
Personal	
   Mixed	
   Corporate	
  
Yes	
   Yes	
   Yes	
  	
  &	
  Corporate	
  
None	
   MAM	
   MDM	
  &	
  MAM	
  
No	
   Yes	
   Yes	
  
© 2013 Beyond Mobile Ltd June 5, 2013
STAKEHOLDER MANAGEMENT
19
Clean	
  vs.	
  dirty	
  wireless	
  =	
  same	
  
On	
  campus	
  =	
  enterprise	
  policed	
  
Keep	
  out	
  of	
  trouble	
  with	
  	
  the	
  
regulator	
  
Employee	
  traffic	
  content	
  filtered	
  
Info	
  Sec,	
  HR/Legal	
  
© 2013 Beyond Mobile Ltd June 5, 2013
STAKEHOLDER MANAGEMENT
20
Apply	
  IT	
  policy	
  
Same	
  quality	
  as	
  LAN	
  
Wi-­‐Fi	
  as	
  a	
  commodity	
  
Protect	
  data	
  vs.	
  network	
  
BYOD	
  Don’t	
  compromise	
  usability	
  for	
  security	
  
Container	
  (s)	
  vs	
  	
  MAM	
  
© 2013 Beyond Mobile Ltd June 5, 2013
BUY VS BUILD
Corporate	
  IT	
  in	
  Financial	
  Services	
  idenGty	
  crisis	
  
	
  
Case	
  Study	
  =	
  Buy	
  as	
  a	
  service	
  >	
  Build	
  	
  
	
  
Market	
  not	
  Mature	
  
	
  
Result	
  was	
  a	
  Build	
  &	
  Buy	
  project	
  
	
  
One	
  name	
  stood	
  out	
  in	
  access	
  control	
  and	
  
provisioning	
  =	
   Aruba	
  
© 2013 Beyond Mobile Ltd June 5, 2013
BUY VS BUILD
!
© 2013 Beyond Mobile Ltd June 5, 2013
TECHNICAL DESIGN
Data	
  with	
  some	
  voice,	
  small	
  amount	
  of	
  Desktop	
  Video	
  conferencing	
  growing	
  
	
  
Cloud	
  based	
  guest	
  provisioning	
  soluGon	
  
	
  
SegregaGon	
  IT	
  Polies	
  mean	
  no	
  direct	
  connecGon	
  to	
  AcGve	
  Directory	
  	
  
	
  
Guest	
  registraGon	
  –	
  sponsor	
  approved	
  
	
  
Employee	
  Device	
  enrolment	
  process	
  to	
  be	
  lightweight	
  	
  (email	
  address)	
  
	
  
Employee	
  content	
  filtered	
  on	
  BYOD	
  devices*	
  
	
  
Improve	
  scale	
  of	
  deployment	
  	
  
	
  
Single,	
  global	
  wireless	
  soluGon	
  to	
  employees.	
  	
  
© 2013 Beyond Mobile Ltd June 5, 2013
Wi-­‐Fi	
  1st	
  Gen 	
  	
   Wi-­‐Fi	
  2nd	
  Gen	
   Wi-­‐Fi	
  FUTURE	
  
REQUIREMENTS
24
802.11a/b/g	
   802.11	
  n	
  to	
  ac	
   802.11ac	
  
Data	
   Data	
  /	
  Voice	
   Data	
  /	
  Voice	
  /	
  Video	
  
Manual	
   Online	
  registraGon	
  &	
  
Sponsor	
  approval	
  
Federated	
  B2B	
  
Build	
   Build	
  &	
  Buy	
   Buy	
  
None	
   non-­‐criGcal	
  service	
  
severity	
  4	
  SLA	
  	
  
Clearpass	
  CPPM	
  6.x	
   Aruba	
  end	
  to	
  end	
  
ParGally	
  supported	
  	
  	
  	
  	
  	
  	
  	
  	
  
Cisco	
  BBSM	
  4.x	
  
CriGcal	
  service	
  	
  
LAN	
  replacement	
  
© 2013 Beyond Mobile Ltd June 5, 2013
TECHNICAL DESIGN
Internet
Un-provisioned
Device
Provisioned
Device
LAN DMZ
BYOD
MDPS
FWFW
EXT DMZ FWEXT DMZ FW
Wage
Firewall
Cisco DMZ
anchor
Controller
DMZ Bluecoat
Proxy
EoIP
PWR ENET 11A/N 11B/G/N
105
BYOD User traffic
EoIP
Radius Auth
HTTPS
Publisher
Subscriber
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
APAC CPPM
AAA servers
EMEA CPPM
AAA Servers
Amigopod Appliance for
remote cloud provisioning
of BYOD and guest self
registration
Cisco Intranet
Controller
Guest traffic
Cisco Access
Point
Internet
EXT DMZ FWEXT DMZ FW
DMZ Bluecoat
Proxy
Publisher
Subscriber
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
APAC CPPM
AAA servers
EMEA CPPM
AAA Servers
Amigopod Appliance for
remote cloud provisioning
of BYOD and guest self
registration
ccess
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
Un-provisioned
Device
Provisioned
Device
BYOD
MDPS
Cisco DMZ
anchor
Controller
PWR ENET 11A/N 11B/G/N
105
Publisher
Amigopod Appliance for remote
cloud provisioning of BYOD and
guest self registration
EMEA CPPM
AAA Servers
Cisco Intranet
Controller
Cisco Access
Point
© 2013 Beyond Mobile Ltd June 5, 2013
LESSONS LEARNT
Don’t	
  under	
  esGmate	
  the	
  amount	
  of	
  tesGng	
  required	
  
	
  
BYOD	
  footprint	
  for	
  tesGng	
  can	
  be	
  never	
  ending	
  
	
  
Amount	
  &	
  complexity	
  of	
  devices	
  leads	
  to	
  issues	
  with	
  tools	
  for	
  troubleshooGng	
  
	
  
Process	
  engineering	
  important	
  
	
  
Support	
  specialists	
  too	
  thin	
  on	
  ground	
  –	
  Mobility	
  support	
  is	
  a	
  specialist	
  skillset	
  
	
  
Web	
  content	
  filtering	
  !=	
  control	
  
© 2013 Beyond Mobile Ltd June 5, 2013
LESSONS LEARNT
Certain	
  CONTENT	
  FILTER	
  RULES	
  did	
  not	
  make	
  sense	
  for	
  employee	
  BYOD	
  we	
  had	
  to	
  lobby	
  for	
  
changes;	
  
	
  
Chat/Instant	
  Messaging	
  –	
  Whole	
  category	
  originally	
  blocked.	
  
•  Allow	
  clients	
  that	
  connect	
  to	
  corporate	
  IM	
  plarorms	
  as	
  would	
  be	
  monitored.	
  
•  Block	
  all	
  other	
  IM	
  plarorms.	
  But	
  Allow	
  messaging	
  for	
  services	
  Ged	
  to	
  SMS	
  (e.g.	
  iMessage)	
  	
  
	
  
VOIP	
  clients	
  &	
  Online	
  Storage	
  -­‐	
  –	
  Whole	
  category	
  originally	
  blocked.	
  
•  Allow	
  all	
  –	
  these	
  were	
  from	
  personal	
  devices	
  and	
  corporate	
  data	
  was	
  “contained”	
  	
  
•  Provides	
  a	
  beser	
  experience	
  around	
  apps	
  that	
  sync	
  to	
  dropbox	
  etc	
  
	
  
Remote	
  Access	
  Tools	
  -­‐	
  	
  –	
  Whole	
  category	
  originally	
  blocked.	
  
•  Allow	
  –	
  Only	
  personal	
  devices	
  can	
  connect	
  to	
  Wi-­‐Fi	
  then	
  there	
  is	
  no	
  company	
  data	
  at	
  risk	
  of	
  
loss.	
  	
  
	
  
Sotware	
  Downloads	
  	
  
•  Allow	
  –	
  Provides	
  a	
  beser	
  user	
  experience	
  as	
  this	
  would	
  allow	
  App	
  store	
  downloads	
  to	
  
personal	
  device	
  to	
  work	
  on	
  campus	
  
© 2013 Beyond Mobile Ltd June 5, 2013
LESSONS LEARNT
Credit'Suisse'Employee
Aruba
Clearpass
Cloud'Service
Access'Point
Intranet'Controller
DMZ'Controller
BYOD
SSID
Guest'&'
Provisioning
SSID
Internet
Bluecoat'DMZ
Proxy
1
2
5
7
8
9
6
10
CS'BYOD'Device
CS'Desktop
4
3
Processes	
  are	
  important	
  
	
  
Help	
  stakeholders	
  understand	
  them	
  by	
  walking	
  
them	
  through	
  various	
  scenarios	
  
	
  
-­‐  Guest	
  registraGon	
  
-­‐  Employee	
  registraGon	
  
-­‐  Employee	
  day	
  to	
  day	
  use	
  
-­‐  Support	
  
© 2013 Beyond Mobile Ltd June 5, 2013
YOUR PATH TO BYOD IN FINANCIALS
29
ObjecGves	
  
Design	
  
ExecuGon	
  
• 	
  Have	
  clear	
  business	
  objecGves.	
  	
  
• 	
  Senior	
  stakeholders	
  briefings.	
  
• 	
  Mature	
  requirements	
  &	
  early	
  engagement	
  necessary	
  with	
  IT	
  suppliers	
  
• 	
  What	
  are	
  your	
  security	
  policy	
  objecGves	
  
• Think	
  about	
  process	
  &support	
  design	
  as	
  well	
  as	
  the	
  technology	
  
• Translate	
  the	
  risk	
  posture	
  to	
  security	
  controls	
  	
  
• Don’t	
  compromise	
  usability	
  for	
  security	
  (impact	
  of	
  security	
  discussions)	
  
• Select	
  technology	
  plarorms	
  and	
  suppliers	
  
• Build	
  in	
  compliance	
  from	
  the	
  beginning	
  
• Test,	
  Test	
  and	
  test	
  some	
  more	
  
And finally …. Celebrate a success !
© 2013 Beyond Mobile Ltd June 5, 2013

Mais conteúdo relacionado

Mais procurados

Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfPrivate-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfJason Lee
 
Optimizing business travel: We have the math for that
Optimizing business travel: We have the math for thatOptimizing business travel: We have the math for that
Optimizing business travel: We have the math for thatCisco Canada
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
How Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareHow Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareCisco Webex
 
Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Cisco Webex
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsCisco Webex
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill offIT Tech
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Mot Owi4 Solutions For Manufacturing Presentation
Mot Owi4 Solutions For Manufacturing PresentationMot Owi4 Solutions For Manufacturing Presentation
Mot Owi4 Solutions For Manufacturing PresentationP&R Communications
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
Wildix X Convention 2018 - Slides
Wildix X Convention 2018 - SlidesWildix X Convention 2018 - Slides
Wildix X Convention 2018 - SlidesWildix
 
Edimax - 2013 SMB solution_guide
Edimax - 2013 SMB  solution_guideEdimax - 2013 SMB  solution_guide
Edimax - 2013 SMB solution_guideSreekanth Menon
 
Meraki Company Presentation
Meraki Company PresentationMeraki Company Presentation
Meraki Company PresentationGautham Sajith
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Mahbubul Alam
 

Mais procurados (20)

Fujitsu Italy
Fujitsu ItalyFujitsu Italy
Fujitsu Italy
 
Private-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdfPrivate-Enterprise-Networks.pdf
Private-Enterprise-Networks.pdf
 
Optimizing business travel: We have the math for that
Optimizing business travel: We have the math for thatOptimizing business travel: We have the math for that
Optimizing business travel: We have the math for that
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
How Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient CareHow Seamless Meetings Save Time and Improve Patient Care
How Seamless Meetings Save Time and Improve Patient Care
 
CV Irfan Yaqoob
CV  Irfan YaqoobCV  Irfan Yaqoob
CV Irfan Yaqoob
 
Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...Working remotely? Learn how to collaborate and communicate effectively in the...
Working remotely? Learn how to collaborate and communicate effectively in the...
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex Rooms
 
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off10 competitors cisco couldn’t kill off
10 competitors cisco couldn’t kill off
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
Mot Owi4 Solutions For Manufacturing Presentation
Mot Owi4 Solutions For Manufacturing PresentationMot Owi4 Solutions For Manufacturing Presentation
Mot Owi4 Solutions For Manufacturing Presentation
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
Wildix X Convention 2018 - Slides
Wildix X Convention 2018 - SlidesWildix X Convention 2018 - Slides
Wildix X Convention 2018 - Slides
 
Edimax - 2013 SMB solution_guide
Edimax - 2013 SMB  solution_guideEdimax - 2013 SMB  solution_guide
Edimax - 2013 SMB solution_guide
 
Meraki Company Presentation
Meraki Company PresentationMeraki Company Presentation
Meraki Company Presentation
 
Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012Inter op nyc_mahbubul alam_october 2012
Inter op nyc_mahbubul alam_october 2012
 

Destaque

Wish — creative digital campaign
Wish — creative digital campaignWish — creative digital campaign
Wish — creative digital campaignPartmedia agency
 
Carla mathis instructional program analysis
Carla mathis   instructional program analysisCarla mathis   instructional program analysis
Carla mathis instructional program analysisCarla Mathis
 
Gazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październikGazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październikJacek Hanysz
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseJason Boud
 
Katalog osaa 2013 a
Katalog osaa 2013   aKatalog osaa 2013   a
Katalog osaa 2013 aJacek Hanysz
 
27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптеку27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптекуPartmedia agency
 
Методы увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтахМетоды увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтахPartmedia agency
 

Destaque (7)

Wish — creative digital campaign
Wish — creative digital campaignWish — creative digital campaign
Wish — creative digital campaign
 
Carla mathis instructional program analysis
Carla mathis   instructional program analysisCarla mathis   instructional program analysis
Carla mathis instructional program analysis
 
Gazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październikGazetka Osaa wrzesień-październik
Gazetka Osaa wrzesień-październik
 
The Path to BYOD in Financial Enterprise
The Path to BYOD in Financial EnterpriseThe Path to BYOD in Financial Enterprise
The Path to BYOD in Financial Enterprise
 
Katalog osaa 2013 a
Katalog osaa 2013   aKatalog osaa 2013   a
Katalog osaa 2013 a
 
27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптеку27 000 товаров или как мы делали интернет-аптеку
27 000 товаров или как мы делали интернет-аптеку
 
Методы увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтахМетоды увеличения «конверсии» на мебельных сайтах
Методы увеличения «конверсии» на мебельных сайтах
 

Semelhante a Airheads main conference slideshare v1.0

VFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startupVFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startupScience City Bristol
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Cisco Russia
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...AirTight Networks
 
Service Provider SDN – New Business Opportunities
Service Provider SDN – New Business OpportunitiesService Provider SDN – New Business Opportunities
Service Provider SDN – New Business OpportunitiesEricsson
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...SORACOM,INC
 
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile Applications
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile ApplicationsWSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile Applications
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile ApplicationsWSO2
 
Foundational 5G Say Yes to your Customers Today - with special guest, Cradle...
Foundational 5G  Say Yes to your Customers Today - with special guest, Cradle...Foundational 5G  Say Yes to your Customers Today - with special guest, Cradle...
Foundational 5G Say Yes to your Customers Today - with special guest, Cradle...Maureen Donovan
 
“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego
“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego
“How 5G is Pushing Processing to the Edge,” a Presentation from InseegoEdge AI and Vision Alliance
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividadschangan1
 
Sample event production design
Sample event production designSample event production design
Sample event production designDavid Nix
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxCloudera, Inc.
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13kentdsorensen
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointMaureen Donovan
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeADVA
 

Semelhante a Airheads main conference slideshare v1.0 (20)

VFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startupVFB 2013 - Growth Funding - Raising money for a technology startup
VFB 2013 - Growth Funding - Raising money for a technology startup
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Service Provider SDN – New Business Opportunities
Service Provider SDN – New Business OpportunitiesService Provider SDN – New Business Opportunities
Service Provider SDN – New Business Opportunities
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
Appi fi
Appi fiAppi fi
Appi fi
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
 
Cloud connected Solutions
Cloud connected SolutionsCloud connected Solutions
Cloud connected Solutions
 
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile Applications
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile ApplicationsWSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile Applications
WSO2Con US 2013 - Using Jaggery in Telecom Web and Mobile Applications
 
Foundational 5G Say Yes to your Customers Today - with special guest, Cradle...
Foundational 5G  Say Yes to your Customers Today - with special guest, Cradle...Foundational 5G  Say Yes to your Customers Today - with special guest, Cradle...
Foundational 5G Say Yes to your Customers Today - with special guest, Cradle...
 
“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego
“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego
“How 5G is Pushing Processing to the Edge,” a Presentation from Inseego
 
Eficiencia y productividad
Eficiencia y productividadEficiencia y productividad
Eficiencia y productividad
 
Sample event production design
Sample event production designSample event production design
Sample event production design
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Partner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptxPartner Briefing_January 25 (FINAL).pptx
Partner Briefing_January 25 (FINAL).pptx
 
Perceptions of BYOD
Perceptions of BYODPerceptions of BYOD
Perceptions of BYOD
 
Vidyo Corporate
Vidyo Corporate Vidyo Corporate
Vidyo Corporate
 
TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13TimberCloud Webinar 02-19-13
TimberCloud Webinar 02-19-13
 
Broad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w CradlepointBroad Sky Networks - In-vehicle presentation w Cradlepoint
Broad Sky Networks - In-vehicle presentation w Cradlepoint
 
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist CollegeDynamic Software Defined Network Infrastructure Test Bed at Marist College
Dynamic Software Defined Network Infrastructure Test Bed at Marist College
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Airheads main conference slideshare v1.0

  • 1. © 2013 Beyond Mobile Ltd June 5, 2013
  • 2. © 2013 Beyond Mobile Ltd June 5, 2013 INTRODUCTION 2 An  IT  infrastructure  specialist  with  over  20  years  in  the   financial  services  sector.       11  years  with  Credit  Suisse  and  6  with  Chase  (JP  Morgan)     Tough  environment  in  Financial  services  and  deparGng  a   role  as  Director  in  IT  for  Credit  Suisse  to  start  Beyond   Mobile.     Beyond  Mobile  offers  Strategy,  Product  and  Sales  advice  to   technology  companies  in  the  early  stage  of  their  business   plans.  
  • 3. © 2013 Beyond Mobile Ltd June 5, 2013 3 WHAT IS AN ENTERPRISE
  • 4. © 2013 Beyond Mobile Ltd June 5, 2013 4 ALL THE SAME RIGHT !
  • 5. © 2013 Beyond Mobile Ltd June 5, 2013 DeclaraGon   NX   Sovereign   circa  2130s   April  16,  2151   October  30,  2372   52,000  metric  tonnes   998,000  metric  tonnes   3,250,000  metric  tonnes   300  metres   225  metres   685.7  metres        <  Warp  2   Warp  5.2   Warp  9.995   None   Photonic  torpedoes   Phase  cannons   Arrays  Phasers   USS  Enterprise     (XCV  330)   NX01   NCC-­‐1701-­‐E   5 COMPARISON STAR TREK ENTERPRISE
  • 6. © 2013 Beyond Mobile Ltd June 5, 2013 Enterprise  1   (Financial)     Case  Study   (Financial)   Enterprise  3   (consulGng)   COMPARISON OF AN ENTERPRISE 6 120,000   65,000   20,000   143,000   80,000   2,000   28,000   15,000   20,000   170,000   120,000   2,500   Yes   Yes   No   “dirty  network”  “clean  network”   “clean  network”  
  • 7. © 2013 Beyond Mobile Ltd June 5, 2013 EVIL INTERNET & WIRELESS 7 Wi-Fi BANNED Custom laptops with Wi-Fi cards removed Ethernet ports and drivers locked down Remote access restricted to dial up Almost impossible to be productive unless in the office  
  • 8. © 2013 Beyond Mobile Ltd June 5, 2013 EVOLUTION NOT REVOLUTION 8
  • 9. © 2013 Beyond Mobile Ltd June 5, 2013 NETWORK PERIMETER SECURITY 9 2007
  • 10. © 2013 Beyond Mobile Ltd June 5, 2013 NETWORK PERIMETER SECURITY 10
  • 11. © 2013 Beyond Mobile Ltd June 5, 2013 NETWORK STRATEGY 11 DEPERIMITISATION  
  • 12. © 2013 Beyond Mobile Ltd June 5, 2013 2007 – 1ST GEN WI-FI 12 CISO concedes some Wi-Fi allowed “Managed” endpoints only Guest internet access allowed No employee personal devices allowed User experience not considered Wi-Fi Design poor Global inconsistency  
  • 13. © 2013 Beyond Mobile Ltd June 5, 2013 2007 – 1ST GEN WI-FI 13 Un-provisioned Device Provisioned Device LAN DMZ BYOD MDPS FWFW EXT DMZ FWEXT DMZ FW Wage Firewall Cisco DMZ anchor Controller DMZ Bluecoat Proxy EoIP PWR ENET 11A/N 11B/G/N 105 BYOD User traffic EoIP Radius Auth HTTPS Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration APAC CPPM AAA servers EMEA CPPM AAA Servers Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration Cisco Intranet Controller Guest traffic Cisco Access Point
  • 14. © 2013 Beyond Mobile Ltd June 5, 2013 2009 CHALLENGERS 14 “Why can’t I use the corporate Wi-Fi to sync my work email” “Cellular coverage is so bad in my building and it’s crazy employee’s cant use the Corporate Wi-Fi on their personal devices” Crumbling of IT Walled gardens
  • 15. © 2013 Beyond Mobile Ltd June 5, 2013 2011 THE GAME CHANGED 15 Real estate smart strategies Wi-Fi shifted to a core “enabling” technology and business enabler. BYOD strategy was built demanding better services CIO – build it quick but I wouldn’t start from there, if I was you Poor coverage, low contention, IT vs. Business
  • 16. © 2013 Beyond Mobile Ltd June 5, 2013 THE BEGINNING OR THE END? 16 Requirements Stakeholder Management Buy as a Service vs Build Technical Design Build Lesson’s learnt
  • 17. © 2013 Beyond Mobile Ltd June 5, 2013 REQUIREMENTS 17 Guest Standard Employee Complex Employee Standard Complex
  • 18. © 2013 Beyond Mobile Ltd June 5, 2013 Guest     Standard  Employee   Complex  Employee   REQUIREMENTS 18 Medium   Medium   High   Low   Med   High  /  Regulated   Personal   Mixed   Corporate   Yes   Yes   Yes    &  Corporate   None   MAM   MDM  &  MAM   No   Yes   Yes  
  • 19. © 2013 Beyond Mobile Ltd June 5, 2013 STAKEHOLDER MANAGEMENT 19 Clean  vs.  dirty  wireless  =  same   On  campus  =  enterprise  policed   Keep  out  of  trouble  with    the   regulator   Employee  traffic  content  filtered   Info  Sec,  HR/Legal  
  • 20. © 2013 Beyond Mobile Ltd June 5, 2013 STAKEHOLDER MANAGEMENT 20 Apply  IT  policy   Same  quality  as  LAN   Wi-­‐Fi  as  a  commodity   Protect  data  vs.  network   BYOD  Don’t  compromise  usability  for  security   Container  (s)  vs    MAM  
  • 21. © 2013 Beyond Mobile Ltd June 5, 2013 BUY VS BUILD Corporate  IT  in  Financial  Services  idenGty  crisis     Case  Study  =  Buy  as  a  service  >  Build       Market  not  Mature     Result  was  a  Build  &  Buy  project     One  name  stood  out  in  access  control  and   provisioning  =   Aruba  
  • 22. © 2013 Beyond Mobile Ltd June 5, 2013 BUY VS BUILD !
  • 23. © 2013 Beyond Mobile Ltd June 5, 2013 TECHNICAL DESIGN Data  with  some  voice,  small  amount  of  Desktop  Video  conferencing  growing     Cloud  based  guest  provisioning  soluGon     SegregaGon  IT  Polies  mean  no  direct  connecGon  to  AcGve  Directory       Guest  registraGon  –  sponsor  approved     Employee  Device  enrolment  process  to  be  lightweight    (email  address)     Employee  content  filtered  on  BYOD  devices*     Improve  scale  of  deployment       Single,  global  wireless  soluGon  to  employees.    
  • 24. © 2013 Beyond Mobile Ltd June 5, 2013 Wi-­‐Fi  1st  Gen     Wi-­‐Fi  2nd  Gen   Wi-­‐Fi  FUTURE   REQUIREMENTS 24 802.11a/b/g   802.11  n  to  ac   802.11ac   Data   Data  /  Voice   Data  /  Voice  /  Video   Manual   Online  registraGon  &   Sponsor  approval   Federated  B2B   Build   Build  &  Buy   Buy   None   non-­‐criGcal  service   severity  4  SLA     Clearpass  CPPM  6.x   Aruba  end  to  end   ParGally  supported                   Cisco  BBSM  4.x   CriGcal  service     LAN  replacement  
  • 25. © 2013 Beyond Mobile Ltd June 5, 2013 TECHNICAL DESIGN Internet Un-provisioned Device Provisioned Device LAN DMZ BYOD MDPS FWFW EXT DMZ FWEXT DMZ FW Wage Firewall Cisco DMZ anchor Controller DMZ Bluecoat Proxy EoIP PWR ENET 11A/N 11B/G/N 105 BYOD User traffic EoIP Radius Auth HTTPS Publisher Subscriber Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration APAC CPPM AAA servers EMEA CPPM AAA Servers Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration Cisco Intranet Controller Guest traffic Cisco Access Point Internet EXT DMZ FWEXT DMZ FW DMZ Bluecoat Proxy Publisher Subscriber Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration APAC CPPM AAA servers EMEA CPPM AAA Servers Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration ccess Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point Un-provisioned Device Provisioned Device BYOD MDPS Cisco DMZ anchor Controller PWR ENET 11A/N 11B/G/N 105 Publisher Amigopod Appliance for remote cloud provisioning of BYOD and guest self registration EMEA CPPM AAA Servers Cisco Intranet Controller Cisco Access Point
  • 26. © 2013 Beyond Mobile Ltd June 5, 2013 LESSONS LEARNT Don’t  under  esGmate  the  amount  of  tesGng  required     BYOD  footprint  for  tesGng  can  be  never  ending     Amount  &  complexity  of  devices  leads  to  issues  with  tools  for  troubleshooGng     Process  engineering  important     Support  specialists  too  thin  on  ground  –  Mobility  support  is  a  specialist  skillset     Web  content  filtering  !=  control  
  • 27. © 2013 Beyond Mobile Ltd June 5, 2013 LESSONS LEARNT Certain  CONTENT  FILTER  RULES  did  not  make  sense  for  employee  BYOD  we  had  to  lobby  for   changes;     Chat/Instant  Messaging  –  Whole  category  originally  blocked.   •  Allow  clients  that  connect  to  corporate  IM  plarorms  as  would  be  monitored.   •  Block  all  other  IM  plarorms.  But  Allow  messaging  for  services  Ged  to  SMS  (e.g.  iMessage)       VOIP  clients  &  Online  Storage  -­‐  –  Whole  category  originally  blocked.   •  Allow  all  –  these  were  from  personal  devices  and  corporate  data  was  “contained”     •  Provides  a  beser  experience  around  apps  that  sync  to  dropbox  etc     Remote  Access  Tools  -­‐    –  Whole  category  originally  blocked.   •  Allow  –  Only  personal  devices  can  connect  to  Wi-­‐Fi  then  there  is  no  company  data  at  risk  of   loss.       Sotware  Downloads     •  Allow  –  Provides  a  beser  user  experience  as  this  would  allow  App  store  downloads  to   personal  device  to  work  on  campus  
  • 28. © 2013 Beyond Mobile Ltd June 5, 2013 LESSONS LEARNT Credit'Suisse'Employee Aruba Clearpass Cloud'Service Access'Point Intranet'Controller DMZ'Controller BYOD SSID Guest'&' Provisioning SSID Internet Bluecoat'DMZ Proxy 1 2 5 7 8 9 6 10 CS'BYOD'Device CS'Desktop 4 3 Processes  are  important     Help  stakeholders  understand  them  by  walking   them  through  various  scenarios     -­‐  Guest  registraGon   -­‐  Employee  registraGon   -­‐  Employee  day  to  day  use   -­‐  Support  
  • 29. © 2013 Beyond Mobile Ltd June 5, 2013 YOUR PATH TO BYOD IN FINANCIALS 29 ObjecGves   Design   ExecuGon   •   Have  clear  business  objecGves.     •   Senior  stakeholders  briefings.   •   Mature  requirements  &  early  engagement  necessary  with  IT  suppliers   •   What  are  your  security  policy  objecGves   • Think  about  process  &support  design  as  well  as  the  technology   • Translate  the  risk  posture  to  security  controls     • Don’t  compromise  usability  for  security  (impact  of  security  discussions)   • Select  technology  plarorms  and  suppliers   • Build  in  compliance  from  the  beginning   • Test,  Test  and  test  some  more   And finally …. Celebrate a success !
  • 30. © 2013 Beyond Mobile Ltd June 5, 2013