SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Beyond BYOD
 The Optimal Experience for Any Workspace
  Scot Hull
  Security Specialist
  Spring 2012



© 2012 Cisco and/or its affiliates. All rights reserved.
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
2011
                                                            employee-owned devices used to
                  41%                                       access business applications —Forrester

                                                            of college students/young employees
                 40%                                        prefer a lower-paying job that has
                                                            more flexibility               —CCWTR




                                                            Of US information workers spend time
                 56%                                        working outside the office   —Forrester




                                                            of IT staff is struggling to keep
             100%                                           up with mobility trends          —Gartner



 © 2012 Cisco and/or its affiliates. All rights reserved.                                           2
© 2012 Cisco and/or its affiliates. All rights reserved.   3
© 2012 Cisco and/or its affiliates. All rights reserved.   4
© 2012 Cisco and/or its affiliates. All rights reserved.   5
Does your organization have a “BYOD” Security Policy?


                                                           Do your employees use their personal
                                                           smart phones or tablets for work?

                                                           Are you protected against vulnerabilities
                                                           introduced by personal devices and social
                                                           media sites?

                                                           Do you have a consistent access control
                                                           policy for guests, contractors, wired users,
                                                           wireless users, etc?

                                                           Do you track users or authenticate them
                                                           before allowing them on your network?

                                                           Do you know what devices are on your
                                                           network?
© 2012 Cisco and/or its affiliates. All rights reserved.                                                  6
The Platform Chaos is Shaking Out
Android King of Smartphones, While Apple Reigns in Tablets

                                                           89%
                                                                       75%
                                                                 26%




                                                           10%

                                                                 36%
                                                                       22%


                                                           1%

                                                                 23%


© 2012 Cisco and/or its affiliates. All rights reserved.                     7
462 million

   CHALLENGE




           350M of these devices connecting to Facebook!
© 2012 Cisco and/or its affiliates. All rights reserved.                 8
© 2012 Cisco and/or its affiliates. All rights reserved.   9
© 2012 Cisco and/or its affiliates. All rights reserved.   10
BYOD Security Risks
Employee-owned Mobile Devices
Are Riskiest

                                                       THREATS

• Difficult to control and secure (1/3 of
      all workers are out of the office)
• Malware (Web: #1 attack vector)
• Vulnerability to the organization
• Data loss from lost or stolen devices
• Access control breach
• Policy compliance challenges




Source: 2011 ISACA IT Risk/Reward Barometer, US Edition (www.isaca.org/risk-reward-barometer)


© 2012 Cisco and/or its affiliates. All rights reserved.                                        11
Customer Goals
 WorthyPriorities d Use Cases1.                               Protect endpoints
                                                              from Web 2.0
                                                              threats
                                                           2. Provide secure
                                                              remote access from
                                                              devices
                                                           3. Authenticate &
                                                              Authorize wireless
                                                              users who are
                                                              connecting to
                                                              network (Guests,
                                                              Contractors, etc.)


                       54% block social media as a matter of policy. Great!
                    What about those smart phones synching with your laptops?
© 2012 Cisco and/or its affiliates. All rights reserved.                        12
Home, Hospital, 3G
                                                                                                            iPhone, Kindle, home
                                                                                                                   laptop
                                                                   Desktop, iPad
                                                                   Hospital, home

                                                                                               Hospital,
                                                                                              HotSpot, 3G
 High user density
 Limited scalability for
  more users/devices
 Different access needs
  by device, user,
  application, location
 Inconsistent experience
                                                                                  Android phone, tablet
 Security challenges                                                             Hospital, home
 High complexity




                                                             Hospital, branch clinics,                            Hospital
                                                             home, 3G iPad, iPhone,                          Lenovo, BlackBerry
                                                                  home laptop

  © 2012 Cisco and/or its affiliates. All rights reserved.                                                            Cisco Confidential   13
Securing                          Managing      Delivering
                           Any                             Complexity   High-Quality
                          Access                           And Scale     Experience


© 2012 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   14
Uncompromised Experience for Any Workspace




Device Onboarding                                          Unified     Uncompromised   Simplified
and Guest Access                                           Policy        Experience    Operations



        BYOD                                                         Beyond BYOD
© 2012 Cisco and/or its affiliates. All rights reserved.                                   Cisco Confidential   15
© 2012 Cisco and/or its affiliates. All rights reserved.   16
Trusted
                                                            WiFi




                             Authenticate User
                             Fingerprint Device
                             Apply Corporate Config
                             Enterprise Apps
                             Automatic Policies




© 2012 Cisco and/or its affiliates. All rights reserved.             Cisco Confidential   17
Unified Policy
                                                                     -Zero touch provisioning
                                                           Trusted
                                                                     - MDM integration
                                                            WiFi




                          Apply defined policy
                          profiles based on:                            Uncompromised
                                     Device Type                          Experience
                                     User
                                     Location
                                     MDM posture




                                                                           Simplified
                                                                           Operations


© 2012 Cisco and/or its affiliates. All rights reserved.                      Cisco Confidential   18
Trusted
                                                                          WiFi




                                                     Access: FULL
                                                    Electronic Medical Records
                                                    Mobile TelePresence
                                                    Email
                                                    Instant Messenger




© 2012 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   19
Trusted
                                                             WiFi




© 2012 Cisco and/or its affiliates. All rights reserved.             20
Unified Policy
                                                                                              -Identity based access
                                                                      Access: Limited
                                                                                              control
                                                                     Filtered EMR             -Endpoint scanning
                                                                     Internet
                                                                     Patient visit tracking
                                                           Trusted
                                                             WiFi




                                                                                                  Uncompromised
                                                                                                    Experience
                                                                                                -Client acceleration
                                                                                                - 802.11u, 802.11r
                                                                                                -Jabber on iPad




                                                                                              Simplified Operations



© 2012 Cisco and/or its affiliates. All rights reserved.                                                            21
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
Trusted
                                                                                    WiFi




                                                                Access: FULL
                                                           Apply defined policy
                                                           profiles based on:
                                                              Video Facilities
                                                              Class Content
                                                              Collaboration Apps
                                                              Student Records




© 2012 Cisco and/or its affiliates. All rights reserved.                                     Cisco Confidential   23
Access: Limited

                                 Access: Limited                       Internet
                                                                       Class Content
                                     Internet                          Collaboration Apps
                                     Class Content
                                     Collaboration Apps




                           Access: Limited

                              Internet
                                                           Access: Limited
                              Class Content                Internet               Collaboration Apps

                                                           Class Content
                              Collaboration Apps




© 2012 Cisco and/or its affiliates. All rights reserved.                                         Cisco Confidential   24
Play Video                     Play Video




                                   Play Video              Play Video



© 2012 Cisco and/or its affiliates. All rights reserved.                Cisco Confidential   25
One Network
  -Client Acceleration
  -Video scale
  -POE pass-through




              One Policy
-Identity based access control




       One Management



    © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   26
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   27
WiFi Hotspot




                                                           Access: Limited

                                                             Internet
                                                             Account History
                                                             Specials




© 2012 Cisco and/or its affiliates. All rights reserved.                           28
SIZE
                                                              M
                                                           FIND




                                                           COLLECTION

                                                           STYLE

                                                           COLOR

                                                           ACCESSORIES




© 2012 Cisco and/or its affiliates. All rights reserved.                 29
Unified Policy
- Identity-based access
control




                                                                                   Payment
                                                                                   Complete
    Uncompromised
      Experience
-802.11r, 802.11u
-Client acceleration
                                                                    WiFi Hotspot
-Location



                                                              Access: Full

                                                              Customer ERP
                                                              Employee News
                                                              Inventory
                                                              Specials

         Simplified                                           Internet access


         Operations


   © 2012 Cisco and/or its affiliates. All rights reserved.                                   30
© 2012 Cisco and/or its affiliates. All rights reserved.   31
Unified Policy                                             Add to Client File?
-Identity-based access
control
- ScanSafe                                                               YES              NO




                                                              IMG_2301    IMG_2302      IMG_2303           IMG_2304




   Uncompromised
     Experience
-802.11r
                                                                                            WiFi Hotspot
-Outdoor Wi-Fi
-Interference protection


                                                                                     Access: Limited

                                                                                       My Policy
                                                                                       Internet access




Simplified Operations


   © 2012 Cisco and/or its affiliates. All rights reserved.                                                           32
© 2012 Cisco and/or its affiliates. All rights reserved.   33
Trusted WIFI




         Unified Policy                                                                    HD
                                                         VoIP          WebEx
- Identity based access                                                                   Video
                                                                Access: Network Admin
control
                                                          Prime Management     Collaboration
                                                          Email                Internet




       Uncompromised
         Experience




 Simplified Operaitons
-Realtime experience
tracking
- Policy integration
- Wired/wireless
monitoring and/or its affiliates. All rights reserved.
    © 2012 Cisco                                                                                  34
NEW Identity Services Engine (ISE) Features




SINGLE SOURCE                                              For wired, wireless, VPN and cellular access.
   OF POLICY                                               Policy based on user, device, application, compliance, trust level


    EASY SELF-                                             One-step self-registration to speed adoption of new devices,
   PROVISIONING                                            and minimize administrative overhead (ISE 1.1 MR)


     MDM POLICY                                            Information exchange between MDM applications and ISE for
    INTEGRATION                                            deep visibility into devices to create and enforce policies

© 2012 Cisco and/or its affiliates. All rights reserved.                                                                        35
Seamless wired/wireless/VPN
Uncompromised                                              Highest performance and scale
Experience                                                 Future-ready standards



Unified                                                    Single source for wired,
                                                           wireless,VPN, MDM
Policy                                                     Context-aware access



Simplified                                                 User experience monitoring
Operations                                                 Wired, wireless management


© 2012 Cisco and/or its affiliates. All rights reserved.                                   36
© 2012 Cisco and/or its affiliates. All rights reserved.   37
Thank You



© 2012 Cisco and/or its affiliates. All rights reserved.   38

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Home Monitoring over IoT based Wifi Module
IRJET-  	  Home Monitoring over IoT based Wifi ModuleIRJET-  	  Home Monitoring over IoT based Wifi Module
IRJET- Home Monitoring over IoT based Wifi ModuleIRJET Journal
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transitionCisco Canada
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITSolarWinds
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maorShahar Geiger Maor
 
What's Yours Is Mine
What's Yours Is MineWhat's Yours Is Mine
What's Yours Is MineSymantec
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldApperian
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...Lillie Coney
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
IDG_iPad_for_business_survey_2012
IDG_iPad_for_business_survey_2012IDG_iPad_for_business_survey_2012
IDG_iPad_for_business_survey_2012Alexandrova Natalia
 
iPad for Business Survey 2012
iPad for Business Survey 2012iPad for Business Survey 2012
iPad for Business Survey 2012Yann Hermouet
 

Was ist angesagt? (18)

IRJET- Home Monitoring over IoT based Wifi Module
IRJET-  	  Home Monitoring over IoT based Wifi ModuleIRJET-  	  Home Monitoring over IoT based Wifi Module
IRJET- Home Monitoring over IoT based Wifi Module
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transition
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of IT
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Mobile payment v3
Mobile payment v3Mobile payment v3
Mobile payment v3
 
Networking stki summit 2012 -shahar geiger maor
Networking  stki summit 2012 -shahar geiger maorNetworking  stki summit 2012 -shahar geiger maor
Networking stki summit 2012 -shahar geiger maor
 
What's Yours Is Mine
What's Yours Is MineWhat's Yours Is Mine
What's Yours Is Mine
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Perceptions of BYOD
Perceptions of BYODPerceptions of BYOD
Perceptions of BYOD
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Securing Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD WorldSecuring Mobile Apps: New Approaches for the BYOD World
Securing Mobile Apps: New Approaches for the BYOD World
 
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
 
IoT.ppt
IoT.pptIoT.ppt
IoT.ppt
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
IDG_iPad_for_business_survey_2012
IDG_iPad_for_business_survey_2012IDG_iPad_for_business_survey_2012
IDG_iPad_for_business_survey_2012
 
iPad for Business Survey 2012
iPad for Business Survey 2012iPad for Business Survey 2012
iPad for Business Survey 2012
 

Ähnlich wie Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012

Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security TrendsCisco Russia
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiMasha Geller
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech WeekThe Judge Group
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveRobert Herjavec
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Apperian
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)Andris Soroka
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your OrganizationCognizant
 

Ähnlich wie Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012 (20)

BYOD
BYODBYOD
BYOD
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare GarlatiAPPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
 
BYOD Security Risks for Business
BYOD Security Risks for BusinessBYOD Security Risks for Business
BYOD Security Risks for Business
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
Securing mobile devices 1
Securing mobile devices 1Securing mobile devices 1
Securing mobile devices 1
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
Got BYOD? Expand Your Mobile Workforce with App-level Security and Lifecycle ...
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Making BYOD Work for Your Organization
Making BYOD Work for Your OrganizationMaking BYOD Work for Your Organization
Making BYOD Work for Your Organization
 

Kürzlich hochgeladen

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012

  • 1. Beyond BYOD The Optimal Experience for Any Workspace Scot Hull Security Specialist Spring 2012 © 2012 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. 2011 employee-owned devices used to 41% access business applications —Forrester of college students/young employees 40% prefer a lower-paying job that has more flexibility —CCWTR Of US information workers spend time 56% working outside the office —Forrester of IT staff is struggling to keep 100% up with mobility trends —Gartner © 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. 5
  • 6. Does your organization have a “BYOD” Security Policy? Do your employees use their personal smart phones or tablets for work? Are you protected against vulnerabilities introduced by personal devices and social media sites? Do you have a consistent access control policy for guests, contractors, wired users, wireless users, etc? Do you track users or authenticate them before allowing them on your network? Do you know what devices are on your network? © 2012 Cisco and/or its affiliates. All rights reserved. 6
  • 7. The Platform Chaos is Shaking Out Android King of Smartphones, While Apple Reigns in Tablets 89% 75% 26% 10% 36% 22% 1% 23% © 2012 Cisco and/or its affiliates. All rights reserved. 7
  • 8. 462 million CHALLENGE 350M of these devices connecting to Facebook! © 2012 Cisco and/or its affiliates. All rights reserved. 8
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. 9
  • 10. © 2012 Cisco and/or its affiliates. All rights reserved. 10
  • 11. BYOD Security Risks Employee-owned Mobile Devices Are Riskiest THREATS • Difficult to control and secure (1/3 of all workers are out of the office) • Malware (Web: #1 attack vector) • Vulnerability to the organization • Data loss from lost or stolen devices • Access control breach • Policy compliance challenges Source: 2011 ISACA IT Risk/Reward Barometer, US Edition (www.isaca.org/risk-reward-barometer) © 2012 Cisco and/or its affiliates. All rights reserved. 11
  • 12. Customer Goals WorthyPriorities d Use Cases1. Protect endpoints from Web 2.0 threats 2. Provide secure remote access from devices 3. Authenticate & Authorize wireless users who are connecting to network (Guests, Contractors, etc.) 54% block social media as a matter of policy. Great! What about those smart phones synching with your laptops? © 2012 Cisco and/or its affiliates. All rights reserved. 12
  • 13. Home, Hospital, 3G iPhone, Kindle, home laptop Desktop, iPad Hospital, home Hospital, HotSpot, 3G  High user density  Limited scalability for more users/devices  Different access needs by device, user, application, location  Inconsistent experience Android phone, tablet  Security challenges Hospital, home  High complexity Hospital, branch clinics, Hospital home, 3G iPad, iPhone, Lenovo, BlackBerry home laptop © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. Securing Managing Delivering Any Complexity High-Quality Access And Scale Experience © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Uncompromised Experience for Any Workspace Device Onboarding Unified Uncompromised Simplified and Guest Access Policy Experience Operations BYOD Beyond BYOD © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. © 2012 Cisco and/or its affiliates. All rights reserved. 16
  • 17. Trusted WiFi  Authenticate User  Fingerprint Device  Apply Corporate Config  Enterprise Apps  Automatic Policies © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Unified Policy -Zero touch provisioning Trusted - MDM integration WiFi Apply defined policy profiles based on: Uncompromised Device Type Experience User Location MDM posture Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Trusted WiFi Access: FULL Electronic Medical Records Mobile TelePresence Email Instant Messenger © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Trusted WiFi © 2012 Cisco and/or its affiliates. All rights reserved. 20
  • 21. Unified Policy -Identity based access Access: Limited control Filtered EMR -Endpoint scanning Internet Patient visit tracking Trusted WiFi Uncompromised Experience -Client acceleration - 802.11u, 802.11r -Jabber on iPad Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. 21
  • 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Trusted WiFi Access: FULL Apply defined policy profiles based on: Video Facilities Class Content Collaboration Apps Student Records © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Access: Limited Access: Limited Internet Class Content Internet Collaboration Apps Class Content Collaboration Apps Access: Limited Internet Access: Limited Class Content Internet Collaboration Apps Class Content Collaboration Apps © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. Play Video Play Video Play Video Play Video © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. One Network -Client Acceleration -Video scale -POE pass-through One Policy -Identity based access control One Management © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. WiFi Hotspot Access: Limited Internet Account History Specials © 2012 Cisco and/or its affiliates. All rights reserved. 28
  • 29. SIZE M FIND COLLECTION STYLE COLOR ACCESSORIES © 2012 Cisco and/or its affiliates. All rights reserved. 29
  • 30. Unified Policy - Identity-based access control Payment Complete Uncompromised Experience -802.11r, 802.11u -Client acceleration WiFi Hotspot -Location Access: Full Customer ERP Employee News Inventory Specials Simplified Internet access Operations © 2012 Cisco and/or its affiliates. All rights reserved. 30
  • 31. © 2012 Cisco and/or its affiliates. All rights reserved. 31
  • 32. Unified Policy Add to Client File? -Identity-based access control - ScanSafe YES NO IMG_2301 IMG_2302 IMG_2303 IMG_2304 Uncompromised Experience -802.11r WiFi Hotspot -Outdoor Wi-Fi -Interference protection Access: Limited My Policy Internet access Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. 32
  • 33. © 2012 Cisco and/or its affiliates. All rights reserved. 33
  • 34. Trusted WIFI Unified Policy HD VoIP WebEx - Identity based access Video Access: Network Admin control Prime Management Collaboration Email Internet Uncompromised Experience Simplified Operaitons -Realtime experience tracking - Policy integration - Wired/wireless monitoring and/or its affiliates. All rights reserved. © 2012 Cisco 34
  • 35. NEW Identity Services Engine (ISE) Features SINGLE SOURCE For wired, wireless, VPN and cellular access. OF POLICY Policy based on user, device, application, compliance, trust level EASY SELF- One-step self-registration to speed adoption of new devices, PROVISIONING and minimize administrative overhead (ISE 1.1 MR) MDM POLICY Information exchange between MDM applications and ISE for INTEGRATION deep visibility into devices to create and enforce policies © 2012 Cisco and/or its affiliates. All rights reserved. 35
  • 36. Seamless wired/wireless/VPN Uncompromised Highest performance and scale Experience Future-ready standards Unified Single source for wired, wireless,VPN, MDM Policy Context-aware access Simplified User experience monitoring Operations Wired, wireless management © 2012 Cisco and/or its affiliates. All rights reserved. 36
  • 37. © 2012 Cisco and/or its affiliates. All rights reserved. 37
  • 38. Thank You © 2012 Cisco and/or its affiliates. All rights reserved. 38

Hinweis der Redaktion

  1. 90 percent…
  2. These same trends are also affecting other industriesFor example, retailers are seeing a huge return from using wireless mobile devices to get customers to convert on purchases. Studies show that users who bring in a coupon on their mobile device are 30% more likely to convert or purchase the promoted product or service. A recent study by Gartner also showed that mobile couponing was one of the top activities consumers who use mobile devices for shopping.
  3. TowerGroup estimates that efficiency increases 20% to 30% because the transmission of information is on demand and more efficient than the traditional process of taking notes and photos and using them later to compile a report. The mobile solution reduces a two-step process to a one-step process.
  4. 48.9% say the iPad helps them be more responsive to clients
  5. We have talked about quite a few security challenges today and approaches to address them. But with so much change upon us, where should an organization start. One approach is to perhaps ask yourself and your organization some questions that might help you answer how your security strategy is ready to address these changes and enable the business:Are you exploring new business models in the cloud?Do your employees use their personal smart phones/tablets/PC/other for work?Are you protected against vulnerabilities introduced by collaboration tools and social media sites?Do you proactively protect your business against newest threats? How do you cope with zero day threats? What are your compliance needs? Are you meeting them?Are you enforcing the same security policies consistently across your organization? Are your security operational cost rising with increased security complexity?
  6. A recent Cisco Connected World Report shows that employees expect to have more flexible work options. For many, such flexibility is even more important than salary. IDC predicts that in 2012, the number of mobile devices is likely to reach 462 million, exceeding PC shipments.Such increased access methods and devices present major challenges for many organizations, as they try to maintain a high level of security while supporting productivity and work flexibility. Some specific challenges include:1) Mobile workers need access to resources on the internal network from anywhere, and they also need access to cloud-based services.2) The large number of user-owned mobile devices and many different types of these devices make it difficult for organizations to identify the devices and to ensure policy compliance.3) Without proper protection, data residing on the mobile devices becomes a high risk of corporate data loss as well as compliance violations.
  7. That’s pretty incredible, but just how much is our hunger for always-connected data growing? Globally, mobile data traffic will grow 26-fold from 2010 to 2015, a compound annual growth rate of 92%. This is getting interesting.
  8. that’s over 15 billion mobile-connected devices just four years from now. And these mobile-connected devices will generate as much traffic in 2015 as the entire global mobile network in 2010.
  9. In addition to the multi-dimensional complexity of the internet edge, the traffic traversing the internet edge is richer than ever before. Not many years ago the workstations were locked down and all the applications that you needed to use or access were installed or explicitly made accessible by IT on the your machine. If you needed a sales app or a finance app, IT would come and install the application or the fat client on the user’s machine. Today the situation is dramatically different. While email was one of the first applications enabling the borderless internet edge experience, the traffic today is much more complex and includes application types like web surfing, video, audio, SaaS, applications tunneling over the Web (IM, P2P). With more and more traffic going over the Web, HTTP has become the new TCP.It is becoming more and more of a common site where employees are logged into WebEx, Enterprise Email, Facebook / LinkedIn, their personal email – all at the same time, thus blurring the lines between business traffic and personal traffic at the internet edge. While this has in many ways improved collaboration and productivity, it raises new challenges for effective management of this traffic.
  10. Imagine what this could mean in a healthcare setting.A busy doctor doesn’t have time to sit down at his desk to get info on what patients he needs to see and their medical background.So what if that doctor were to buy an iPad on his lunch break?
  11. He’d have to talk to the IT person about having the device onboarded..The IT manager tells the doctor that can self-provision his access and “onboard” the device and the network will apply all the correct policies and facilitate installation of approved apps Since he wants full access, he needs to accept an MDM client for security. Things like remote wipe and data loss prevention are critical to keeping the company network secure.Luckily, the Cisco infrastructure can help him apply these policies automatically, without IT intervention
  12. The doctor is alright with accepting all these security configurations. He knows that with the right network set-up, he can rely on his mobile device to help track his patient visits and tell him who’s on his rotation.
  13. When he goes into a treatment room to see his patient…
  14. …he can pull up their EMR and x-ray images on his tablet.Cisco’s Aironet 3600 and WLAN controller actively avoids RF interference from the in-room blanket warmer with CleanAir technology.And his iPad, which is a “one spatial stream” device – it’s a slower 802.11n speed – is actively accelerated by the access point using Cisco beamforming technology called ClientLink. The new ClientLink 2.0 technology now accelerates 802.11n devices in addition to legacy 802.11a/g.If he discovers that he needs to consult another specialist, he can use his mobile device to facilitate this collaboration using Jabber, the same application he uses on his hospital-issued laptop.
  15. All of this requires secure access to the hospital network. But that can be more complicated than it sounds.IT engineers need to ensure that all the different users in the hospital can get on the network with different levels of access. And depending on how secure their device is, they might need different levels of access even for the same person.Cisco’s Identity Services Engine, or ISE, monitors for policy changes, consumes posture information from MDM, and applies contextual policy to make sure he gets the right amount of access.And it ensures that his patient is also given the right level of access to look at a filtered version of her EMR, her doctor’s notes on their discussion, and check her email while she’s there. The network needs to allow her to do this – but without letting her access the hospital’s entire set of secure patient files.  This was already in here, but we just didn’t really show it on screen. Let’s pull up her device and show Policy: Patient Access, with access to:My RecordsTrack this VisitInternet Access)
  16. Our doctor then visits a teaching hospital to deliver a lecture…
  17. When she arrives at the lecture hall where he teaches his class, ISE recognizes that he is faculty and applies policy that gives her access to video facilities along with class content, collaboration apps and student records.  Policy: Faculty
  18. As her students take their seats, they connect their Android devices, iPads, and laptops using the different ISE policy applied to students, which allows them to access the internet, class content and collaboration apps.
  19. When the class begins, she multicasts a video on green technology to the 100 students seated in the lecture hall
  20. When one of her students using telepresence asks a question, she diagrams the answer on an electronic whiteboard and emails the student her notes so she’ll have it to reference later.
  21. Her students rely on network access not just in the classroom, but basically everywhere they go.Upon leaving class, one of these students heads to her favorite clothing store to buy something for her big date that weekend.When she walks in, her iPhone automatically authenticates onto the Wi-Fi hotspot network.Do we need to say something there highlighting a feature of this technology?
  22. A pop-up window on her phone welcomes her back to the store and suggests some new arrivals that complement her past purchases and are available in her size.Policy: Loyal Customer, with access to: Account History SpecialsInternet access 
  23. She tries them on virtually, and when she finds one that she’s interested in, she clicks the “find” button. Using Ciso-Qualcomm technology, her phone then helps her navigate to the right location in the store.
  24. After she finds the perfect item for her date, a clerk approaches with a mobile POS device, completing her transaction. Policy: Sales Representative, with access to:Customer ERPEmployee NewsInventorySpecialsInternet access
  25. After completing his purchase, the doctor goes on break. He needs to go see his insurance agent about a recent fender bender.After driving to the office, he goes inside to meet his agent and is intrigued by the workspace which is all-wireless and run mostly using Cius tablets.
  26. His agent meets him in the parking lot to look at the damage to the clerk’s car.They take some photos of the dents and discuss the claim process. Since the agent’s Cius is connected using an AP 1550, she can stay connected to the WiFi even in the parking lot.<click>The agent is able to use the Cius camera to add photos of the damage directly to the clerk’s file.Since ISE recognizes her as an employee, she’s granted automatic access to the customer’s ERP and company information like a list of approved repair shops . Policy: Adjuster, with access to: EmailCustomer ERPApproved repair shop databaseInternet access Policy: Policy HolderMy Policy Internet access<click>After taking all the photos, she brings up a list of approved auto centers that can fix the doctor’s car. She emails the list to the doctoralong with a copy of the claim.The doctoris able to open both of these items using customer access to their network. And since they’re protected by ScanSafe, he can be secure that the files have already been scanned to make sure they’re free of malware.
  27. <segue>
  28. At the end of the day, our IT manager that helped the doctor self-provision checks his dashboard to see how the network is looking for a user standpointHe sees performance of VOIP and WebEx with HD video are doing great.He receives an “Unauthorized Access Attempt” alert and opens Prime Infrastructure to investigate – it was an employee trying to access financial records on an unmanaged device – the network disallowed access.
  29. And you can do it without putting a huge burden on IT. The challenge of dealing with the wave of new devices risks creating management problems and escalating your OpEx as you hire more technicians and buy more troubleshooting products.But with Cisco’s BYOD+ solutions, you can build access and single-point management into your network architecture, lowering your OpEx through integrated workflows and simplified troubleshooting.
  30. These are just a few examples of how Cisco helps IT deliver “experience-centric” mobility solutions go beyond BYOD to secure, optimize and manage multiple user, device and application types.So why should you choose Cisco?