SlideShare a Scribd company logo
1 of 108
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1
Toronto, Canada
May 30 2013
BYOD and
Virtualized Desktops
Follow us on Twitter at #CiscoConnect_TO
qr.net/cc2013
Agenda
qr.net/cc2013
1
2
3
What and how to make it possible
Cisco’s distinct approach to BYOD and VDI
Services approach to BYOD and VDI - Q&A
qr.net/cc2013
Question for you…
qr.net/cc2013
BYOD?
qr.net/cc2013
BYOD?
VDI?
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
700M
smartphones sales in 2012
100M
Apple iPads forecasted in 2013
3Milli
WebEx App downloaded on iTunes
80%
Hosted Virtual Desktops in China
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Transitioning to a Post-PC World
New choices are available at every level of the traditional stack.
PC World Post-PC World
Client OS
Server
Architecture
Applications
Devices
Converging Workplace
users on Hosted Virtual Desktop (HVD) by 2016
(Gartner, 2012)
77M
Converging Workplace
of Enterprises will support BYOD
(Cisco IBSG Horizons study, 2012)
90%
Converging Workplace
of IT leaders are implementing or planning to implement
UC on VDI terminals
(Nemertes, 2012)
60%
"Bring your own device" (BYOD) drives innovation
for CIOs and the business by increasing the
number of mobile application users in the
workforce.
BYOD improves employee satisfaction, resulting in
a favorable perception of CIOs and their
organizations.
CIOs can use BYOD as a cost reduction and
avoidance mechanism.
companies expect to stop providing devices to workers by 2016
38%
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
This is not the future, it’s the new normal...
21© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BYOD touches the entire business
Lines-of-Business/HR
Compliance Operations
Security Operations
Application Team
Endpoint
Team
Network
Team
Data Center Team
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Clouds
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
ONE POLICY
Cisco Collaboration Portfolio
Cisco Collaboration Portfolio
Unified
Communica-ons
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco
Unified
Communications
Manager
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco’s Any Device Landscape (April 30, 2013)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Corporate VXI Endpoints
3,101
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
* Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
BYOD – Risks and Challenges
Deliver Applications on Any Device
Secure information and communications
Interoperability across devices
Enable Collaboration Beyond Corporate Boundaries
Device Management
Cisco IT BYOD Architecture
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Porta
ls
Local Exchange Unstructured
Data Cache User ProfileData
Provisioning&Management
CiscoEnterpriseStore
VDI
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53
Cisco BYOD
Smart Solution Strategy
BYOD Architecture
Identity and Policy
Identity Profiling
VLAN 10
VLAN 20
Wireless LAN
Controller
DHCP
RADIUS
SNMP
NetFlow
HTTP
DNS
Cisco® ISE
Unified Access
Management
IEEE 802.1x EAP
User Authentication
1
HQ
2:38 p.m.
Profiling to
Identify Device
2
6
Full or Partial Access
Granted
Personal
Asset
Company Asset
3
Posture
of the Device
Policy
Decision
4
5
Enforce Policy in the
Network
Corporate
Resources
Internet Only
Cisco Prime™ : Central Network Management
Unified Infrastructure: Wired and Wireless Networks
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
BYOD Validated Solution Components
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir
Improved Performance
Proactive and automatic
interference mitigation
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
AP 3600
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
Access Point Innovation
The Tablet AP, enhanced
throughput and coverage for
tablets and smart devices
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Integrated Device Profiling and Posture
Assessment
Profiling of wired and wireless devices Integrated and built into
ISE policy
Consistent Policy for
Device Categories
System-wide Visibility with Cisco Prime NCS
and ISE
Troubleshoot and Monitoring Consolidated
Data
Guest Lifecycle Management
Provide Guest Access in a seamless,
secure manner
Policy
Employee
Identity Services Engine (ISE)
Simplified Role-Based Access
Keep Existing Logical Design Manage
Security
Group Access
Policy Public Private
Employee Permit Permit
Contractor Permit Deny
Consolidated Contextual Information
Real-Time Awareness
Track Active Users
and Devices
USER ID
ACCESS RIGHTS
DEVICE (and IP/
MAC)
LOCATION
Consolidated Services
Software Packages
ISE
ACS
NAC Profiler
NAC Guest
NAC Manager
NAC Server
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
AFTER
Comprehensive User
and Access Visibility
Unified
Management
Wireless
Wired
Policy
Simple Find and solve user problems fast
Unified View of all devices by user, across networks
Lower Opex More efficient use of IT resources
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Applications
Native or virtual application delivery
Collaborative and corporate applications
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Video
Mobility
Conferencing
Desktop PC Mac
On the desk
Full immersion TelePresence
Mobile device
BlackBerry iPhone iPad Android
Presence
Instant Messaging
Mobile softphone
Inside and outside the firewall
One link to join meeting
Call back to join meeting
Cisco Jabber
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Cisco Jabber
Best User Experience Across Broadest Range of Platforms
Win, Mac iPad, Tablet Smartphone Web
75
Automatic, seamless presence and call control
integration with WebEx
76
Automatic, seamless presence and call control
integration with WebEx
77
Automatic, seamless presence and call control
integration with WebEx
78
Automatic, seamless presence and call control
integration with WebEx
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
WebEx and Mobility
80
WebEx & TelePresence Integration
Brings in-room meeting experiences to remote users with a single touch
TelePresence User WebEx User
Single touch
to join meeting
and share content
Single click
to join meeting
and view content
and video
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Cisco WebEx Meetings for BlackBerry 2.0
• Schedule, start, join, host meetings
• View shared content
• View and Chat with attendees
• Auto callback; mute/unmute
• BlackBerry 10 and earlier
First conferencing app for
BlackBerry 10
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Cisco WebEx Meetings – Android
• Schedule, Start, Join, Host meetings
• View and chat with attendees
• View shared content
• 2-way, high quality, multipoint video
• VoIP and video over Wi-Fi, 3G/4G
• Training Center mobile access
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Cisco WebEx Meetings – iPhone and iPad Video
Experience
• 2-way, high-quality, multipoint
video
• Voice-activated video switching
• Full-screen video
• Portrait & landscape
• View content and video
simultaneously (iPad)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Cisco WebEx Meetings – iPad Content Sharing
• Share in to meetings from your mobile device
iWork documents, PDF, Word, Excel, PPT
Supported files from a Dropbox
Photos from your iPad Camera Roll
Files attached to a meeting space (WebEx Meetings)
• “How to” tips guide on
sharing throughout iPad
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Cisco BYOD + Virtualization
Session Virtualization
Session
Virtualization
Client
Application
Virtualization
Data
Center
Network
Desktop Virtualization
Desktop
Virtualization
Client
Desktop
Virtualization
Data
Center
Network
Why Virtualization?
Application Portability:
Delivering legacy/non-native apps to
broad device set
Example: iPad does not support an
application natively
Data Loss Prevention:
Securing Enterprise applications and
data
Example: avoid storing data locally, use
of virtualization for application subset –
confidential, intellectual property,
financial
Priority Use Cases: Citrix Receiver on Tablets
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
VDI and Real Time
Communications
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Cisco VXI
Cisco Virtualization Experience Infrastructure
Beyond Desktop Virtualization to Unified Workspace
Desktop
Virtualization
• More scalable
• More secure
• Simplified deployment
• Lower cost
• Collaboration
• Workspace mobility
• Network optimization
• End-to-end security
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Collaboration on Any Device with Cisco Jabber
Presence
& IM
Voice Video Conferencing Messaging
Desktop Mobile Thin Clients
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
New Software Strategy for Virtual Environments
• Cisco Virtualization Experience Media Engine
(VXME)
A new software that enables Jabber to run in
virtualized environments
• Supported on thin clients and Windows PCs
Cisco Virtualization Experience Client (VXC) 6215
Windows-based 3rd party thin clients and PCs
• Enable the same Jabber experience running on
virtual desktop as available today on your PC
Presence & IM
High definition video & wideband audio
Conferencing
Cisco VXC 6215
Dell Wyse Z50D
Windows PCs
Windows Thin Clients
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Delivering a Better Collaboration Experience
• Redesigned workspace focused on the user
experience that delivers increased productivity
• Customizable workspace to support the work
environment
• Enterprise-grade voice and video quality and
experience based on Cisco Unified
Communications
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Simplifying Desktop Virtualization for IT
• Leverages the same converged network for
voice, video, data
• Automatically prioritizes voice and video
traffic through network-based QoS and
integration with Cisco MediaNet
• Optimizes network and server resources:
bandwidth reduction from megabytes to
kilobytes
• Supported by leading desktop virtualization
partners, Citrix and VMware
Desktop Virtualization
Protocol
Cisco
VXME
Data Center
User Desktop
Media
Flow
Cisco UC
Manager
Across All Devices
SIP
Signaling
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Medianet
Delivering a Consistent Collaboration Experience
Anywhere, any content, on any device
Environments
Platform
Services
Delivery Model
Experience
Remote
Office Travel
Home
BYOD and Virtualization
Summary
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Deliver capabilities to your end users, not point products
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
BYOD and Mobility are the top priorities for most companies
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
BYOD Driving Organizational Change
Drive New
Business Models Increase Productivity
Increase Agility Attract and Retain Talent
Simplify Operations Speed Time to Market Mitigate Risks
I Can Use iPads
on My Network
Tactical Approach
Strategic Approach
End User
Business
IT
Shifting the Conversation: Whether to HOW
Applications Team:
• Which applications should I make available on any device?
• How do I optimize the performance and delivery of
applications?
Network Engineers:
• How do I troubleshoot wireless access problems?
• How do I separate device issues from network and policy issues?
• How do I ensure user experience?
Security Operations:
• How do I protect my network and data assets from unauthorized
access, malware, DLP, device loss/theft?
• How do I implement multiple security policies per user, device,
etc.?
Compliance Operations:
• How do I ensure corporate legal compliance (SOX, HIPAA,
PCI, etc.)?
Network Operations:
• What devices are on my networks?
• Which users are using what devices?
What apps are being accessed?
• What are the real-time app
performance metrics?
Business & Technical Framework:
• What are Business drivers for BYOD?
• How does IT positively impact business goals?
Translating Complex Into Manageable
BYOD
Service
Kit
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
• Will navigate through the complexities of your
BYOD requirements
• Will create a secure and practical roadmap for
deployment
• Will use proven industry relevant best practices
and methodologies
• Will provide a full scope of services to support
an accelerated deployment form strategy to
pre-production deployment
Moving into How—Accelerating Deployment
Cisco Architects
Cisco BYOD Service Kit
Accelerate BYOD deployment – from strategy to pre-production
Gather business and IT
imperatives
Create High Level future state
architecture and use cases
Develop Strategy and
Roadmap document
Assess current state environment
(LAN, WLAN, Security)
Develop recommendations based on
Cisco best practices
Create BYOD Architecture Assessment
report
Develop BYOD solution design with
potential risks identified
LAN, WLAN, ISE, CPI integration design
guidance and recommendation
Create BYOD Architecture
Design document
Deploy solution in pre-
production environment
Validate use cases in scope
As-built solution knowledge
transfer
BYOD
Service
Kit
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Strategy and Roadmap
Align the network architecture BYOD strategy with business goals and integrating
requirements that address security, compliance risks, user experience,
interoperability and integration
• High-level evaluation, capture the Customer's
BYOD business imperatives, technology
requirements, use cases and implications
• Capture the current state of the network,
including key capabilities, governance/
compliance and business drivers
• Review current infrastructure, security, WLAN
& management requirements against Cisco
Best Practices
• BYOD Strategy and Roadmap Document
• BYOD Customer Requirements Document
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Assessment
Evaluate the current network against identified requirements to provide
recommendations for adoption of future state BYOD architecture
• Assess technical controls and architecture of
existing access network, wireless and security
infrastructure vis-a-vis BYOD
• Assess the current security and risk
management programs and its ability to
support the future state requirements
• Identify strengths, weaknesses, gaps and
recommendations against Cisco best practice
BYOD solution
• BYOD Architecture Assessment Report,
including KPIs, metric dashboard
• Recommendations for adoption of future
state BYOD architecture
• Updated Customer Requirements
Document,
if applicable
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Design
Develop a BYOD architecture design for up to 3 use cases, mapping business
objectives to technical requirements for use in pre-production deployment.
• Define design recommendation, including
proposed network topology, resiliency,
availability, scalability, interoperability
• Guidance on WLAN & ISE integration,
including impact to LAN infrastructure
• Identify and document key risks in the
proposed design
• BYOD Architecture Design Document
• Configuration for WLAN controller, Cisco
Prime (WLAN), access point & ISE
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Pre-Production Deployment
Validate the Cisco BYOD solution design for up to 3 use cases through a pre-
production deployment
• Provide WLAN, Cisco Prime (WLAN), ISE &
AP configuration according to BYOD Design
• Develop BYOD solution test cases,
procedures and success criteria
• Conduct as-built BYOD solution knowledge
transfer
• BYOD solution configuration (WLAN, ISE,
Cisco Prime (WLAN), AP)
• Validate BYOD solution and use case test
results against success criteria
• Conduct as-built BYOD solution knowledge
transfer
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Please Complete Your
Session Evaluation!

More Related Content

What's hot

Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Rick Huijbregts
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ingrid Fernandez, PhD
 

What's hot (20)

Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Intel’s Strategy in IoT Standards
Intel’s Strategy in IoT StandardsIntel’s Strategy in IoT Standards
Intel’s Strategy in IoT Standards
 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
September Patch Tuesday- 2020
September Patch Tuesday- 2020September Patch Tuesday- 2020
September Patch Tuesday- 2020
 

Viewers also liked

Viewers also liked (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data Centre
 
Creating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCreating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar Series
 
Innovation for Country Transformation
Innovation for Country TransformationInnovation for Country Transformation
Innovation for Country Transformation
 
Smart+Connected Communities Canada
Smart+Connected Communities CanadaSmart+Connected Communities Canada
Smart+Connected Communities Canada
 
The Next Five Years
The Next Five YearsThe Next Five Years
The Next Five Years
 
George Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyGeorge Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economy
 
Empowering a High-Performance Organization
Empowering a High-Performance OrganizationEmpowering a High-Performance Organization
Empowering a High-Performance Organization
 
Working Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than EverWorking Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than Ever
 
Innovating the GTA with Ellisdon
Innovating the GTA with EllisdonInnovating the GTA with Ellisdon
Innovating the GTA with Ellisdon
 
The Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy TechnologiesThe Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy Technologies
 
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Cisco’s Nick Adamo on how SPs can support the mobil...
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Has video really killed the audio star?
Has video really killed the audio star?Has video really killed the audio star?
Has video really killed the audio star?
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Simplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybrideSimplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybride
 
Jabber making the most of
Jabber making the most ofJabber making the most of
Jabber making the most of
 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco Services
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transition
 
Better Network Management Through Network Programmability
Better Network Management Through Network ProgrammabilityBetter Network Management Through Network Programmability
Better Network Management Through Network Programmability
 

Similar to Deploy & Manage BYOD and VDI Services

Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
Cisco Russia
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
Felipe Lamus
 

Similar to Deploy & Manage BYOD and VDI Services (20)

Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Brkcld 2215
Brkcld 2215Brkcld 2215
Brkcld 2215
 
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium) CISCO’s Cloud Journey (Keynote at Cloud Symposium)
CISCO’s Cloud Journey (Keynote at Cloud Symposium)
 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handout
 
Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет? Корпоративные сети через 5 лет: что нас ждет?
Корпоративные сети через 5 лет: что нас ждет?
 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
 
Smau milano 2013 lorenzo fava
Smau milano 2013 lorenzo favaSmau milano 2013 lorenzo fava
Smau milano 2013 lorenzo fava
 
Cloud connected Solutions
Cloud connected SolutionsCloud connected Solutions
Cloud connected Solutions
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
 
Education in 2015
Education in 2015Education in 2015
Education in 2015
 

More from Cisco Canada

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Deploy & Manage BYOD and VDI Services

  • 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1 Toronto, Canada May 30 2013 BYOD and Virtualized Desktops Follow us on Twitter at #CiscoConnect_TO
  • 3. Agenda qr.net/cc2013 1 2 3 What and how to make it possible Cisco’s distinct approach to BYOD and VDI Services approach to BYOD and VDI - Q&A
  • 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Transitioning to a Post-PC World New choices are available at every level of the traditional stack. PC World Post-PC World Client OS Server Architecture Applications Devices
  • 13. Converging Workplace users on Hosted Virtual Desktop (HVD) by 2016 (Gartner, 2012) 77M
  • 14. Converging Workplace of Enterprises will support BYOD (Cisco IBSG Horizons study, 2012) 90%
  • 15. Converging Workplace of IT leaders are implementing or planning to implement UC on VDI terminals (Nemertes, 2012) 60%
  • 16. "Bring your own device" (BYOD) drives innovation for CIOs and the business by increasing the number of mobile application users in the workforce.
  • 17. BYOD improves employee satisfaction, resulting in a favorable perception of CIOs and their organizations.
  • 18. CIOs can use BYOD as a cost reduction and avoidance mechanism.
  • 19. companies expect to stop providing devices to workers by 2016 38%
  • 20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 This is not the future, it’s the new normal...
  • 21. 21© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BYOD touches the entire business Lines-of-Business/HR Compliance Operations Security Operations Application Team Endpoint Team Network Team Data Center Team
  • 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Things
  • 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Clouds Connecting Things
  • 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things
  • 26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO
  • 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK
  • 28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT
  • 29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT ONE POLICY
  • 35. Cisco Collaboration Portfolio CLOUD ON PREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 36. Cisco Collaboration Portfolio CLOUD ON PREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on Cisco Unified Communications Manager
  • 37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco’s Any Device Landscape (April 30, 2013)
  • 38. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401
  • 39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401
  • 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Corporate VXI Endpoints 3,101 Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401 * Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
  • 41. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 42. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 BYOD – Risks and Challenges Deliver Applications on Any Device Secure information and communications Interoperability across devices Enable Collaboration Beyond Corporate Boundaries Device Management
  • 43. Cisco IT BYOD Architecture
  • 44. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
  • 45. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
  • 46. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 47. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 48. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management Local Exchange Unstructured Data Cache User ProfileData
  • 49. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Local Exchange Unstructured Data Cache User ProfileData
  • 50. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 51. Cisco IT BYOD Architecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 52. Cisco IT BYOD Architecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Porta ls Local Exchange Unstructured Data Cache User ProfileData Provisioning&Management CiscoEnterpriseStore VDI
  • 53. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53 Cisco BYOD Smart Solution Strategy
  • 54. BYOD Architecture Identity and Policy Identity Profiling VLAN 10 VLAN 20 Wireless LAN Controller DHCP RADIUS SNMP NetFlow HTTP DNS Cisco® ISE Unified Access Management IEEE 802.1x EAP User Authentication 1 HQ 2:38 p.m. Profiling to Identify Device 2 6 Full or Partial Access Granted Personal Asset Company Asset 3 Posture of the Device Policy Decision 4 5 Enforce Policy in the Network Corporate Resources Internet Only Cisco Prime™ : Central Network Management Unified Infrastructure: Wired and Wireless Networks
  • 55. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 BYOD Validated Solution Components
  • 56. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network
  • 57. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 58. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir Improved Performance Proactive and automatic interference mitigation More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 59. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 60. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 61. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation AP 3600 Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network Access Point Innovation The Tablet AP, enhanced throughput and coverage for tablets and smart devices More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 62. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Integrated Device Profiling and Posture Assessment Profiling of wired and wireless devices Integrated and built into ISE policy Consistent Policy for Device Categories System-wide Visibility with Cisco Prime NCS and ISE Troubleshoot and Monitoring Consolidated Data Guest Lifecycle Management Provide Guest Access in a seamless, secure manner Policy Employee Identity Services Engine (ISE) Simplified Role-Based Access Keep Existing Logical Design Manage Security Group Access Policy Public Private Employee Permit Permit Contractor Permit Deny Consolidated Contextual Information Real-Time Awareness Track Active Users and Devices USER ID ACCESS RIGHTS DEVICE (and IP/ MAC) LOCATION Consolidated Services Software Packages ISE ACS NAC Profiler NAC Guest NAC Manager NAC Server
  • 63. Unified Management Find and Solve Problems Quickly
  • 64. BEFORE Many Windows, Fragmented View Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 65. BEFORE Many Windows, Fragmented View AFTER Comprehensive User and Access Visibility Unified Management Wireless Wired Policy Simple Find and solve user problems fast Unified View of all devices by user, across networks Lower Opex More efficient use of IT resources Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 66. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control
  • 67. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data
  • 68. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 69. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 70. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms Applications Native or virtual application delivery Collaborative and corporate applications
  • 71. Cisco Collaboration Portfolio CLOUD ON PREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 72. Video Mobility Conferencing Desktop PC Mac On the desk Full immersion TelePresence Mobile device BlackBerry iPhone iPad Android Presence Instant Messaging Mobile softphone Inside and outside the firewall One link to join meeting Call back to join meeting
  • 74. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 Cisco Jabber Best User Experience Across Broadest Range of Platforms Win, Mac iPad, Tablet Smartphone Web
  • 75. 75 Automatic, seamless presence and call control integration with WebEx
  • 76. 76 Automatic, seamless presence and call control integration with WebEx
  • 77. 77 Automatic, seamless presence and call control integration with WebEx
  • 78. 78 Automatic, seamless presence and call control integration with WebEx
  • 79. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79 WebEx and Mobility
  • 80. 80 WebEx & TelePresence Integration Brings in-room meeting experiences to remote users with a single touch TelePresence User WebEx User Single touch to join meeting and share content Single click to join meeting and view content and video
  • 81. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81 Cisco WebEx Meetings for BlackBerry 2.0 • Schedule, start, join, host meetings • View shared content • View and Chat with attendees • Auto callback; mute/unmute • BlackBerry 10 and earlier First conferencing app for BlackBerry 10
  • 82. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82 Cisco WebEx Meetings – Android • Schedule, Start, Join, Host meetings • View and chat with attendees • View shared content • 2-way, high quality, multipoint video • VoIP and video over Wi-Fi, 3G/4G • Training Center mobile access
  • 83. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83 Cisco WebEx Meetings – iPhone and iPad Video Experience • 2-way, high-quality, multipoint video • Voice-activated video switching • Full-screen video • Portrait & landscape • View content and video simultaneously (iPad)
  • 84. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84 Cisco WebEx Meetings – iPad Content Sharing • Share in to meetings from your mobile device iWork documents, PDF, Word, Excel, PPT Supported files from a Dropbox Photos from your iPad Camera Roll Files attached to a meeting space (WebEx Meetings) • “How to” tips guide on sharing throughout iPad
  • 85. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85 Cisco BYOD + Virtualization Session Virtualization Session Virtualization Client Application Virtualization Data Center Network Desktop Virtualization Desktop Virtualization Client Desktop Virtualization Data Center Network Why Virtualization? Application Portability: Delivering legacy/non-native apps to broad device set Example: iPad does not support an application natively Data Loss Prevention: Securing Enterprise applications and data Example: avoid storing data locally, use of virtualization for application subset – confidential, intellectual property, financial Priority Use Cases: Citrix Receiver on Tablets
  • 86. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86 VDI and Real Time Communications
  • 87. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87 Cisco VXI Cisco Virtualization Experience Infrastructure Beyond Desktop Virtualization to Unified Workspace Desktop Virtualization • More scalable • More secure • Simplified deployment • Lower cost • Collaboration • Workspace mobility • Network optimization • End-to-end security
  • 88. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88 Collaboration on Any Device with Cisco Jabber Presence & IM Voice Video Conferencing Messaging Desktop Mobile Thin Clients
  • 89. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89 New Software Strategy for Virtual Environments • Cisco Virtualization Experience Media Engine (VXME) A new software that enables Jabber to run in virtualized environments • Supported on thin clients and Windows PCs Cisco Virtualization Experience Client (VXC) 6215 Windows-based 3rd party thin clients and PCs • Enable the same Jabber experience running on virtual desktop as available today on your PC Presence & IM High definition video & wideband audio Conferencing Cisco VXC 6215 Dell Wyse Z50D Windows PCs Windows Thin Clients
  • 90. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90 Delivering a Better Collaboration Experience • Redesigned workspace focused on the user experience that delivers increased productivity • Customizable workspace to support the work environment • Enterprise-grade voice and video quality and experience based on Cisco Unified Communications
  • 91. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91 Simplifying Desktop Virtualization for IT • Leverages the same converged network for voice, video, data • Automatically prioritizes voice and video traffic through network-based QoS and integration with Cisco MediaNet • Optimizes network and server resources: bandwidth reduction from megabytes to kilobytes • Supported by leading desktop virtualization partners, Citrix and VMware Desktop Virtualization Protocol Cisco VXME Data Center User Desktop Media Flow Cisco UC Manager Across All Devices SIP Signaling
  • 92. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92 Medianet Delivering a Consistent Collaboration Experience Anywhere, any content, on any device Environments Platform Services Delivery Model Experience Remote Office Travel Home
  • 94. Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 95. Integrate UC and VDI solutions with collaboration and mobility Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 96. Integrate UC and VDI solutions with collaboration and mobility Deliver capabilities to your end users, not point products Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 97. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 98. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 BYOD and Mobility are the top priorities for most companies
  • 99. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 BYOD Driving Organizational Change Drive New Business Models Increase Productivity Increase Agility Attract and Retain Talent Simplify Operations Speed Time to Market Mitigate Risks I Can Use iPads on My Network Tactical Approach Strategic Approach End User Business IT
  • 100. Shifting the Conversation: Whether to HOW Applications Team: • Which applications should I make available on any device? • How do I optimize the performance and delivery of applications? Network Engineers: • How do I troubleshoot wireless access problems? • How do I separate device issues from network and policy issues? • How do I ensure user experience? Security Operations: • How do I protect my network and data assets from unauthorized access, malware, DLP, device loss/theft? • How do I implement multiple security policies per user, device, etc.? Compliance Operations: • How do I ensure corporate legal compliance (SOX, HIPAA, PCI, etc.)? Network Operations: • What devices are on my networks? • Which users are using what devices? What apps are being accessed? • What are the real-time app performance metrics? Business & Technical Framework: • What are Business drivers for BYOD? • How does IT positively impact business goals?
  • 101. Translating Complex Into Manageable BYOD Service Kit
  • 102. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 • Will navigate through the complexities of your BYOD requirements • Will create a secure and practical roadmap for deployment • Will use proven industry relevant best practices and methodologies • Will provide a full scope of services to support an accelerated deployment form strategy to pre-production deployment Moving into How—Accelerating Deployment Cisco Architects
  • 103. Cisco BYOD Service Kit Accelerate BYOD deployment – from strategy to pre-production Gather business and IT imperatives Create High Level future state architecture and use cases Develop Strategy and Roadmap document Assess current state environment (LAN, WLAN, Security) Develop recommendations based on Cisco best practices Create BYOD Architecture Assessment report Develop BYOD solution design with potential risks identified LAN, WLAN, ISE, CPI integration design guidance and recommendation Create BYOD Architecture Design document Deploy solution in pre- production environment Validate use cases in scope As-built solution knowledge transfer BYOD Service Kit
  • 104. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Strategy and Roadmap Align the network architecture BYOD strategy with business goals and integrating requirements that address security, compliance risks, user experience, interoperability and integration • High-level evaluation, capture the Customer's BYOD business imperatives, technology requirements, use cases and implications • Capture the current state of the network, including key capabilities, governance/ compliance and business drivers • Review current infrastructure, security, WLAN & management requirements against Cisco Best Practices • BYOD Strategy and Roadmap Document • BYOD Customer Requirements Document
  • 105. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Assessment Evaluate the current network against identified requirements to provide recommendations for adoption of future state BYOD architecture • Assess technical controls and architecture of existing access network, wireless and security infrastructure vis-a-vis BYOD • Assess the current security and risk management programs and its ability to support the future state requirements • Identify strengths, weaknesses, gaps and recommendations against Cisco best practice BYOD solution • BYOD Architecture Assessment Report, including KPIs, metric dashboard • Recommendations for adoption of future state BYOD architecture • Updated Customer Requirements Document, if applicable
  • 106. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Design Develop a BYOD architecture design for up to 3 use cases, mapping business objectives to technical requirements for use in pre-production deployment. • Define design recommendation, including proposed network topology, resiliency, availability, scalability, interoperability • Guidance on WLAN & ISE integration, including impact to LAN infrastructure • Identify and document key risks in the proposed design • BYOD Architecture Design Document • Configuration for WLAN controller, Cisco Prime (WLAN), access point & ISE
  • 107. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Pre-Production Deployment Validate the Cisco BYOD solution design for up to 3 use cases through a pre- production deployment • Provide WLAN, Cisco Prime (WLAN), ISE & AP configuration according to BYOD Design • Develop BYOD solution test cases, procedures and success criteria • Conduct as-built BYOD solution knowledge transfer • BYOD solution configuration (WLAN, ISE, Cisco Prime (WLAN), AP) • Validate BYOD solution and use case test results against success criteria • Conduct as-built BYOD solution knowledge transfer
  • 108. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108 Please Complete Your Session Evaluation!