More Related Content Similar to Deploy & Manage BYOD and VDI Services (20) More from Cisco Canada (20) Deploy & Manage BYOD and VDI Services1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1
Toronto, Canada
May 30 2013
BYOD and
Virtualized Desktops
Follow us on Twitter at #CiscoConnect_TO
7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Transitioning to a Post-PC World
New choices are available at every level of the traditional stack.
PC World Post-PC World
Client OS
Server
Architecture
Applications
Devices
16. "Bring your own device" (BYOD) drives innovation
for CIOs and the business by increasing the
number of mobile application users in the
workforce.
18. CIOs can use BYOD as a cost reduction and
avoidance mechanism.
20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
This is not the future, it’s the new normal...
21. 21© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BYOD touches the entire business
Lines-of-Business/HR
Compliance Operations
Security Operations
Application Team
Endpoint
Team
Network
Team
Data Center Team
22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Things
24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Clouds
Connecting Things
25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
ONE POLICY
37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco’s Any Device Landscape (April 30, 2013)
38. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Corporate VXI Endpoints
3,101
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
* Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
41. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
42. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
BYOD – Risks and Challenges
Deliver Applications on Any Device
Secure information and communications
Interoperability across devices
Enable Collaboration Beyond Corporate Boundaries
Device Management
44. Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
45. Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
46. Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
47. Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
48. Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Local Exchange Unstructured
Data Cache User ProfileData
49. Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Local Exchange Unstructured
Data Cache User ProfileData
50. Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
51. Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
52. Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Porta
ls
Local Exchange Unstructured
Data Cache User ProfileData
Provisioning&Management
CiscoEnterpriseStore
VDI
53. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53
Cisco BYOD
Smart Solution Strategy
54. BYOD Architecture
Identity and Policy
Identity Profiling
VLAN 10
VLAN 20
Wireless LAN
Controller
DHCP
RADIUS
SNMP
NetFlow
HTTP
DNS
Cisco® ISE
Unified Access
Management
IEEE 802.1x EAP
User Authentication
1
HQ
2:38 p.m.
Profiling to
Identify Device
2
6
Full or Partial Access
Granted
Personal
Asset
Company Asset
3
Posture
of the Device
Policy
Decision
4
5
Enforce Policy in the
Network
Corporate
Resources
Internet Only
Cisco Prime™ : Central Network Management
Unified Infrastructure: Wired and Wireless Networks
55. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
BYOD Validated Solution Components
56. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
57. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
58. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir
Improved Performance
Proactive and automatic
interference mitigation
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
59. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
60. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
61. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
AP 3600
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
Access Point Innovation
The Tablet AP, enhanced
throughput and coverage for
tablets and smart devices
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
62. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Integrated Device Profiling and Posture
Assessment
Profiling of wired and wireless devices Integrated and built into
ISE policy
Consistent Policy for
Device Categories
System-wide Visibility with Cisco Prime NCS
and ISE
Troubleshoot and Monitoring Consolidated
Data
Guest Lifecycle Management
Provide Guest Access in a seamless,
secure manner
Policy
Employee
Identity Services Engine (ISE)
Simplified Role-Based Access
Keep Existing Logical Design Manage
Security
Group Access
Policy Public Private
Employee Permit Permit
Contractor Permit Deny
Consolidated Contextual Information
Real-Time Awareness
Track Active Users
and Devices
USER ID
ACCESS RIGHTS
DEVICE (and IP/
MAC)
LOCATION
Consolidated Services
Software Packages
ISE
ACS
NAC Profiler
NAC Guest
NAC Manager
NAC Server
64. BEFORE
Many Windows, Fragmented View
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
65. BEFORE
Many Windows, Fragmented View
AFTER
Comprehensive User
and Access Visibility
Unified
Management
Wireless
Wired
Policy
Simple Find and solve user problems fast
Unified View of all devices by user, across networks
Lower Opex More efficient use of IT resources
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
66. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
67. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
68. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
69. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
70. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Applications
Native or virtual application delivery
Collaborative and corporate applications
72. Video
Mobility
Conferencing
Desktop PC Mac
On the desk
Full immersion TelePresence
Mobile device
BlackBerry iPhone iPad Android
Presence
Instant Messaging
Mobile softphone
Inside and outside the firewall
One link to join meeting
Call back to join meeting
74. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Cisco Jabber
Best User Experience Across Broadest Range of Platforms
Win, Mac iPad, Tablet Smartphone Web
79. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
WebEx and Mobility
80. 80
WebEx & TelePresence Integration
Brings in-room meeting experiences to remote users with a single touch
TelePresence User WebEx User
Single touch
to join meeting
and share content
Single click
to join meeting
and view content
and video
81. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Cisco WebEx Meetings for BlackBerry 2.0
• Schedule, start, join, host meetings
• View shared content
• View and Chat with attendees
• Auto callback; mute/unmute
• BlackBerry 10 and earlier
First conferencing app for
BlackBerry 10
82. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Cisco WebEx Meetings – Android
• Schedule, Start, Join, Host meetings
• View and chat with attendees
• View shared content
• 2-way, high quality, multipoint video
• VoIP and video over Wi-Fi, 3G/4G
• Training Center mobile access
83. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Cisco WebEx Meetings – iPhone and iPad Video
Experience
• 2-way, high-quality, multipoint
video
• Voice-activated video switching
• Full-screen video
• Portrait & landscape
• View content and video
simultaneously (iPad)
84. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Cisco WebEx Meetings – iPad Content Sharing
• Share in to meetings from your mobile device
iWork documents, PDF, Word, Excel, PPT
Supported files from a Dropbox
Photos from your iPad Camera Roll
Files attached to a meeting space (WebEx Meetings)
• “How to” tips guide on
sharing throughout iPad
85. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Cisco BYOD + Virtualization
Session Virtualization
Session
Virtualization
Client
Application
Virtualization
Data
Center
Network
Desktop Virtualization
Desktop
Virtualization
Client
Desktop
Virtualization
Data
Center
Network
Why Virtualization?
Application Portability:
Delivering legacy/non-native apps to
broad device set
Example: iPad does not support an
application natively
Data Loss Prevention:
Securing Enterprise applications and
data
Example: avoid storing data locally, use
of virtualization for application subset –
confidential, intellectual property,
financial
Priority Use Cases: Citrix Receiver on Tablets
86. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
VDI and Real Time
Communications
87. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Cisco VXI
Cisco Virtualization Experience Infrastructure
Beyond Desktop Virtualization to Unified Workspace
Desktop
Virtualization
• More scalable
• More secure
• Simplified deployment
• Lower cost
• Collaboration
• Workspace mobility
• Network optimization
• End-to-end security
88. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Collaboration on Any Device with Cisco Jabber
Presence
& IM
Voice Video Conferencing Messaging
Desktop Mobile Thin Clients
89. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
New Software Strategy for Virtual Environments
• Cisco Virtualization Experience Media Engine
(VXME)
A new software that enables Jabber to run in
virtualized environments
• Supported on thin clients and Windows PCs
Cisco Virtualization Experience Client (VXC) 6215
Windows-based 3rd party thin clients and PCs
• Enable the same Jabber experience running on
virtual desktop as available today on your PC
Presence & IM
High definition video & wideband audio
Conferencing
Cisco VXC 6215
Dell Wyse Z50D
Windows PCs
Windows Thin Clients
90. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Delivering a Better Collaboration Experience
• Redesigned workspace focused on the user
experience that delivers increased productivity
• Customizable workspace to support the work
environment
• Enterprise-grade voice and video quality and
experience based on Cisco Unified
Communications
91. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Simplifying Desktop Virtualization for IT
• Leverages the same converged network for
voice, video, data
• Automatically prioritizes voice and video
traffic through network-based QoS and
integration with Cisco MediaNet
• Optimizes network and server resources:
bandwidth reduction from megabytes to
kilobytes
• Supported by leading desktop virtualization
partners, Citrix and VMware
Desktop Virtualization
Protocol
Cisco
VXME
Data Center
User Desktop
Media
Flow
Cisco UC
Manager
Across All Devices
SIP
Signaling
92. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Medianet
Delivering a Consistent Collaboration Experience
Anywhere, any content, on any device
Environments
Platform
Services
Delivery Model
Experience
Remote
Office Travel
Home
94. Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
95. Integrate UC and VDI solutions with collaboration and mobility
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
96. Integrate UC and VDI solutions with collaboration and mobility
Deliver capabilities to your end users, not point products
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
97. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3
98. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
BYOD and Mobility are the top priorities for most companies
99. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
BYOD Driving Organizational Change
Drive New
Business Models Increase Productivity
Increase Agility Attract and Retain Talent
Simplify Operations Speed Time to Market Mitigate Risks
I Can Use iPads
on My Network
Tactical Approach
Strategic Approach
End User
Business
IT
100. Shifting the Conversation: Whether to HOW
Applications Team:
• Which applications should I make available on any device?
• How do I optimize the performance and delivery of
applications?
Network Engineers:
• How do I troubleshoot wireless access problems?
• How do I separate device issues from network and policy issues?
• How do I ensure user experience?
Security Operations:
• How do I protect my network and data assets from unauthorized
access, malware, DLP, device loss/theft?
• How do I implement multiple security policies per user, device,
etc.?
Compliance Operations:
• How do I ensure corporate legal compliance (SOX, HIPAA,
PCI, etc.)?
Network Operations:
• What devices are on my networks?
• Which users are using what devices?
What apps are being accessed?
• What are the real-time app
performance metrics?
Business & Technical Framework:
• What are Business drivers for BYOD?
• How does IT positively impact business goals?
102. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
• Will navigate through the complexities of your
BYOD requirements
• Will create a secure and practical roadmap for
deployment
• Will use proven industry relevant best practices
and methodologies
• Will provide a full scope of services to support
an accelerated deployment form strategy to
pre-production deployment
Moving into How—Accelerating Deployment
Cisco Architects
103. Cisco BYOD Service Kit
Accelerate BYOD deployment – from strategy to pre-production
Gather business and IT
imperatives
Create High Level future state
architecture and use cases
Develop Strategy and
Roadmap document
Assess current state environment
(LAN, WLAN, Security)
Develop recommendations based on
Cisco best practices
Create BYOD Architecture Assessment
report
Develop BYOD solution design with
potential risks identified
LAN, WLAN, ISE, CPI integration design
guidance and recommendation
Create BYOD Architecture
Design document
Deploy solution in pre-
production environment
Validate use cases in scope
As-built solution knowledge
transfer
BYOD
Service
Kit
104. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Strategy and Roadmap
Align the network architecture BYOD strategy with business goals and integrating
requirements that address security, compliance risks, user experience,
interoperability and integration
• High-level evaluation, capture the Customer's
BYOD business imperatives, technology
requirements, use cases and implications
• Capture the current state of the network,
including key capabilities, governance/
compliance and business drivers
• Review current infrastructure, security, WLAN
& management requirements against Cisco
Best Practices
• BYOD Strategy and Roadmap Document
• BYOD Customer Requirements Document
105. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Assessment
Evaluate the current network against identified requirements to provide
recommendations for adoption of future state BYOD architecture
• Assess technical controls and architecture of
existing access network, wireless and security
infrastructure vis-a-vis BYOD
• Assess the current security and risk
management programs and its ability to
support the future state requirements
• Identify strengths, weaknesses, gaps and
recommendations against Cisco best practice
BYOD solution
• BYOD Architecture Assessment Report,
including KPIs, metric dashboard
• Recommendations for adoption of future
state BYOD architecture
• Updated Customer Requirements
Document,
if applicable
106. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Design
Develop a BYOD architecture design for up to 3 use cases, mapping business
objectives to technical requirements for use in pre-production deployment.
• Define design recommendation, including
proposed network topology, resiliency,
availability, scalability, interoperability
• Guidance on WLAN & ISE integration,
including impact to LAN infrastructure
• Identify and document key risks in the
proposed design
• BYOD Architecture Design Document
• Configuration for WLAN controller, Cisco
Prime (WLAN), access point & ISE
107. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Pre-Production Deployment
Validate the Cisco BYOD solution design for up to 3 use cases through a pre-
production deployment
• Provide WLAN, Cisco Prime (WLAN), ISE &
AP configuration according to BYOD Design
• Develop BYOD solution test cases,
procedures and success criteria
• Conduct as-built BYOD solution knowledge
transfer
• BYOD solution configuration (WLAN, ISE,
Cisco Prime (WLAN), AP)
• Validate BYOD solution and use case test
results against success criteria
• Conduct as-built BYOD solution knowledge
transfer
108. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Please Complete Your
Session Evaluation!