SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
INSIDE
1 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
Building the Anytime,
Anywhere Network
Mobile technologies are opening enormous new
business opportunities. Capitalizing on them takes
a new approach to networking.
Bask Iyer remembers the days when only the chosen few
enjoyed access to mobile technologies. “It was limited
to road warriors and executives,” says Iyer, senior vice
president and CIO of Sunnyvale, Calif.-based Juniper
Networks Inc.
That was then, however. “Today mobility is no longer
just for the privileged,” Iyer observes. “It’s available
to everybody.” As a result, mobile form factors are no
longer something that Juniper’s IT department merely
accommodates when creating new applications. “They’re
the key interaction point,” Iyer says. “We pay closer
attention to the mobile experience these days than we do to
the PC experience.”
And Juniper is hardly alone. In the span of just a few
short years, smartphones, tablets and other mobile devices
have redefined the technological mainstream. Practically
everyone now relies on them to stay connected with people,
applications and information everywhere and all the time.
For the businesses these users work for and buy from, the upshot is an unprecedented range of opportunities for
competitive differentiation, enhanced productivity and increased agility—opportunities they ignore at their peril. “If you’re
not thinking about new ways of leveraging mobility to make your people more efficient or to expand your customer base,
it’s a safe bet that your competitors are,” says Iyer’s colleague Abner Germanow, Juniper’s director of enterprise marketing.
For corporate IT, capitalizing on mobility’s potential means exchanging ironfisted control over access and devices for
a more flexible approach. IT must balance firm administrative oversight with the freedom today’s knowledge workers
need to innovate in the anytime, anywhere economy. And making that demanding transition without compromising
INSIDE
2 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
security in the process means nothing less than embracing a
totally new approach to building and managing networks.
Unprecedented Opportunity
The numbers alone provide a sense of the extent to which
mobile devices have joined desktops and laptops as everyday
technologies. Manufacturers shipped 461.5 million smartphones
and some 63.6 million tablet devices worldwide in 2011,
according to estimates from analysts at Gartner Inc. Collectively,
that’s over 44 percent more than the 364 million PCs Gartner
expected computer makers to sell in 2011.
Furthermore, it’s not just CEOs and gadget lovers snapping
up all that mobile hardware. It’s practically everyone. Indeed,
by 2015 more than 200 million U.S. consumers will have a
smartphone, tablet or both, according to research firm In-
Stat. That’s roughly 65 percent of everyone in the U.S. And it
is becoming increasingly common for people to use multiple
devices. Indeed, 52 percent of global information workers
currently utilize three or more smart devices at the office,
according to data from Forrester Research Inc., of Cambridge,
Mass., while an incredible 14 percent juggle six or more devices.
Not surprisingly, with handheld devices becoming ubiquitous
in people’s private lives, mobile users are rapidly becoming the
norm rather than the exception at work. In fact, 69 percent of
corporate workers access business applications via a personal
smartphone, and nearly 10 percent use a personal tablet for
business purposes, according to data from Framingham, Mass.-
based analyst firm IDC.
The upshot, for companies that encourage mobility rather
than resist it, has been a dramatically more productive
workforce. Armed with speedy devices and connectivity
everywhere they go, employees can function effectively
anywhere and anytime.
Mobility is also transforming the way companies engage
with customers. “Businesses that have traditionally had an
arm’s length relationship with customers can now connect
with them wherever they go, through mobile apps that enable
people to place orders, check product availability, or utilize
loyalty points,” notes Germanow. And with handsets and the
networks they run on becoming more sophisticated all the time,
even-more-innovative services will soon be possible. “We’ll
eventually see mobile phones that are smart enough to see that
you’re headed to a meeting someplace where parking is limited
and proactively offer to reserve you a spot,” Germanow says.
Technical Headaches
For IT departments, the meteoric rise of mobility has created
a range of significant challenges. Among the most commonly
recognized is the need to extend the security policies they
enforce inside the firewall to people and devices outside it. “A
wired network user is typically static,” observes Rohit Mehra,
director of enterprise communications infrastructure at IDC.
Mobile users, by contrast, may be connecting from anywhere
on any of several devices, each of which may use a different
operating system.
To further complicate matters, cybercrooks are increasingly
employing PC-style malware to attack smartphones and
tablets. The number of viruses targeting the Google Android
platform alone rose an astonishing 3,325 percent in the last
seven months of 2011, according to a Juniper Global Threat
Center study, and hackers have begun adapting viruses and
spyware originally developed for PCs to target mobile devices.
Yet the management systems many companies rely on give
them little to no visibility into which apps are accessing their
network or what those systems are doing.
Then there are the dangers associated with rogue wireless
hotspots that surreptitiously collect user credentials, and with
mobile apps that contain hidden malware. In fact, a 2011
study by the Juniper Global Threat Center found that 14.7
percent of mobile apps request user permissions that can be
3 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
INSIDE
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
used to place a call without a user’s knowledge or approval,
4.8 percent are able to send a short message service (SMS)
message without user authorization, and 30 percent can
obtain a device’s location without approval.
Coping with the loss or theft of devices is an equally urgent
problem. For example, over the course of 2011, 17 percent of
companies using Juniper’s Junos Pulse Mobile Security Suite
utilized the “locate” command to find a missing device, while
over six percent employed the system’s lock feature to guard
against unauthorized use of a lost or stolen device, according
to data submitted to Juniper by its customers.
In addition, users accessing streaming media and
corporate applications via Wi-Fi hotspots and legacy mobile
networks often face latency headaches. With scores of
devices simultaneously transmitting data across the network,
businesses are struggling to keep performance levels high
and provide resilient, always-on connectivity to mobile users.
And with more and more employees using personal mobile
devices at the office as well as on the road, corporate wireless
networks are experiencing traffic snarls as well. “You can
definitely have some performance hits,” says Chris Boykin,
vice president of professional services at Future Com Ltd., a
provider of network and security solutions based in Bedford,
Texas. “Everybody’s sharing that bandwidth.” (For further
discussion of mobility-related bandwidth constraints, see
“Flatter networks deliver better performance for any devices
and applications” on page 9).
Freedom and Control
One thing is for certain: Limiting users to corporate-provided
or -approved devices is no longer an option. “If you block
the users, you just force all this stuff underground and you
may not have a clue where your data is going,” observes
Gartner vice president and distinguished analyst Ken Dulaney.
“If you at least know about the problem, you can manage
it.” Moreover, companies that bar employees from bringing
personal mobile devices to the office are likely to have trouble
attracting and retaining top recruits.
Managing the mobility problem successfully, however, takes
a network capable of giving mobile users the freedom they
crave while also providing IT managers the control they need
to keep their company’s infrastructure and data safe. Among
the core qualities networks must share are robust security,
resilience, and device administration functionality, including
features that defend against virulent malware on day zero.
Networks must ensure mobile-device security mechanisms are
used, protect communications from interception, and remotely
locate, track, lock and wipe clean lost and stolen devices to
protect sensitive personal and corporate data. The ability to
enable consistently strong performance and nonstop seamless
roaming while supporting a wide range of applications, device
types, manufacturers, and operating systems over Wi-Fi as
well as mobile networks is another must.
Significantly, this applies as much to wired infrastructures
as it does to wireless networks, since the wired network is
the mobile network’s backbone. Though people often assume
adding bandwidth will enable them to meet application
and device connectivity needs, this is usually a costly,
cumbersome, and inflexible solution. What’s needed is a
wired network architecture flexible enough to scale smoothly
while delivering reliable connectivity and high performance.
It must also be simple and powerful enough to pool and
allocate network resources efficiently, so organizations
can virtualize devices and manage large and growing
environments with existing personnel. This, in turn, enables
them to optimize their IT investments.
Today’s networks also need more advanced features,
including the ability to enforce security policies differently,
depending on who the users are, what devices they’re using,
what applications they’re using, where they’re located, and how
INSIDE
4 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
they’re accessing the network and its data. For example, some
IT organizations consider mobile devices such as smartphones
and tablets less secure and easier to lose or steal than laptops;
others consider public networks inherently riskier than private
ones. As a result, companies must equip their network to apply
more rigorous controls to a smartphone or a tablet connecting
to business applications from an airport via a free hotspot than
to a notebook connecting from inside a conference room at
corporate HQ. They also need the ability to identify, monitor,
and analyze dozens or hundreds of mobile apps in real time,
and classify them based on variables like who is using them,
how much risk they pose, and what data they’re accessing.
Furthermore, administrators need the ability to define
security policies centrally yet enforce them at the point
of network access or directly on mobile devices. “The
enforcement should be distributed. The policy should be
centralized,” observes Edgar Lombera, vice president of
engineering and principal architect at Torrey Point Group LLC, a
networking consultancy headquartered in Sunnyvale, Calif. That
way, companies can enjoy both the simplicity of consolidated
rules and the efficiency of applying those rules simultaneously
at multiple places near where users are working.
Mobile-Ready Networks
Building a network capable of delivering all these capabilities
takes a series of technologies designed from the ground up for
the needs of the mobilized enterprise:
	 Coordinated, granular, context-based security software
that enforces policies consistently and continuously at
the connection level across wired, wireless, and remote
access networks, anywhere and anytime, while providing
robust remote data wiping and access rights management
capabilities.
	 Network systems that provide a consistent experience
for both users and IT across voice, video, data, presence,
and service-oriented architecture by ensuring wired-like
performance and seamless scalability across wired and
wireless networks.
	 Network management solutions that utilize a single client
application for mobile device management, mobile security,
SSL VPN, wireless provisioning, and network access.
	 Comprehensive access technologies with real-time
automation that provide a foundation for fast, secure,
and reliable application delivery not only to all users but
to all of their devices, including guest, BYOD, and IT-
owned hardware.
	 Network device virtualization technologies that simplify
a network architecture sufficiently to manage device
proliferation without inflating personnel resources,
enhance device performance enough to support rich
media and mobility applications, and easily scale to enable
architecture flexibility and support an explosion in mobile
devices and applications on the network.
Needless to say, equipping the network with these kinds of
solutions won’t be an overnight process for most companies.
Those that invest the time and effort anyway, however, are
likely to find the rewards worthwhile. “Opportunities to create
new services and disrupt existing business models by using
mobile devices are appearing every day,” Germanow says.
It will be companies with truly mobile-ready networks that
capitalize on them first—and profit from them the most.
BYOD
Companies that bar employees from bringing
personal mobile devices to the office are likely to
have trouble attracting and retaining top recruits.
INSIDE
5 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
Securing the
Mobile Enterprise
Today’s mobile landscape requires companies to apply highly granular
security policy, based on the user, device, location, time and application.
Enterprises are becoming relentlessly mobile, with employees of all stripes carrying not just one but likely two or three
devices with which they want to connect to the network at various times. Maybe it’s an Apple iPad for meetings in the
office or on the road, a laptop from home or the coffee shop and a smartphone from anywhere in between.
Although there’s little question that enabling employees to use the device of their choice to access the data and
applications they need makes them more productive—not to mention happier—the practice does present a significant
security challenge for IT. There’s no denying that using mobile devices for business means that sensitive, critical
corporate data and intellectual property have to be secured.
And it’s not just the device that has to be secured; it’s also the connection between the device and the company
network or corporate cloud as well as the various applications in use. What’s more, IT needs a way to ensure that
only authorized users are using the devices and accessing corporate resources.
Wanted: A New Approach to Mobile Security
Meeting all enterprise objectives requires companies to take a
new approach to mobile security, one that looks at security on
a per-person rather than a device-specific basis. “Devices are
ephemeral; people aren’t,” says Chris Christiansen, program
vice president of IDC’s Security Products and Services group.
“And device identity doesn’t help when a device is stolen, lost or
misplaced or an unauthorized person is using it.”
The goal is to have people’s security profile follow them as
they move among different locations and use different devices and
applications. Security is provided for each device and the security profile
dictates what each user can—and cannot—do with each one, taking into account
criteria including where the user is and the application in use. At the same time, the
approach can’t be intrusive; if users find security getting in the way of their day-to-day
tasks, they will find a way around it.
INSIDE
6 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
5: SECURING THE MOBILE
ENTERPRISE
Respondents to IDC’s “2011 Mobile Enterprise Software
Survey” neatly outlined the requirements they deem most
important in a mobile device management system. Security
was clearly a top concern, with software patches and updates
the top requirement, followed closely by policy enforcement,
remote device wipe/lock and application blacklisting/
whitelisting (see Figure 1).
Pervasive Security
At the simplest level, Christiansen says, providing that kind of
pervasive security means looking at the issue from a “to, from
and in” perspective:
	 When you send data to the device, can you authenticate
the information and confirm that it is coming from a
legitimate source?
	 When data is coming from the device, can you confirm
that the data hasn’t been changed, the sender is
authenticated to send it and there’s a high level of trust
in the information?
	 When data is in the device or on a server, do you have
assurance that it is stored correctly and hasn’t been
co-opted by another application, such as malware?
Providing proper authentication increasingly means two-
factor authentication, in which users employ something they
have (which may be the device itself or a third-party token)
and something they know, such as a password. Protecting
data on the device also means being able to lock the device
or provide a “kill pill” to remotely wipe all data if the device is
lost or stolen.
Organizations also want to control which applications
users can download, to protect against the malware that
is increasingly targeting mobile applications, particularly
Android devices. Even if such malware doesn’t succeed in
infecting the device itself, Christiansen warns, the device may
be used as a vector to pass malware along to other devices.
Devising a Security Policy
Addressing these security requirements necessitates policies
to cover various user groups and requires enforcement
mechanisms to ensure that the policies are carried out. The
groups include not only internal constituencies but also
source: IDC’s Mobility Enterprise Software Survey, 2011
FIGURE 1
The most important features for an organization as
it relates to mobile device management system.
Software
patches, updates
Policy enforcement
Software delivery
Remote device
wipe/lock
Backup and restore
Security features
such as encryption,
application white/
black listing
Help desk support/
troubleshooting
Provisioning/
bootstrapping
new devices
0 10 20 30 40 50 60
(% of respondents)
INSIDE
7 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
5: SECURING THE MOBILE
ENTERPRISE
visitors, customers, partners, and increasingly, contractors.
For example, policies may allow employees to use their
own devices at work so long as they agree to secure the
device with a password and agree that the company reserves
the right to wipe the e-mail account and certain data if the
device is compromised.
In terms of applications, companies have to determine
which ones won’t be allowed (blacklisting) or, more often,
simply define which applications are allowed (whitelisting)
and deny all others. The list of acceptable applications will
naturally vary, depending on the user group. Also, companies
should be able to set a policy that precludes the use of
certain mobile features and functions—such as the device’s
camera—if the device is used in an area of the company
where sensitive information is stored. Similarly, perhaps the
marketing group is allowed to access Web applications such
as Facebook, but only for work-related purposes—meaning
they can’t use it to play games. And all policies for mobile
devices have to sync with the company’s overall IT security
policies; you shouldn’t be reinventing the wheel.
“What people really want is a single set of controls
and policies so they can normalize the mobile security
environment across multiple heterogeneous device types
and operating environments,” Christiansen says.
The Juniper Approach
In short, customers need a solution that covers all sorts
of mobile requirements, from casual consumer activity to
business-critical applications, but without layers of complexity.
Customers need mobile security that is at once simple to
implement and operate and also effective.
That’s what Juniper’s Simply Connected portfolio is all
about. Simply Connected is a collection of integrated security,
switching and wireless products that enables customers to
build a secure, scalable, highly available solution for both
company- and employee-owned devices. Simply Connected
products enable companies to create security policies once
and apply them across wired, wireless and remote access
networks, in a context-aware fashion delivering holistic and
coordinated security for all enterprise network access.
For example, whereas security reports might formerly have
provided a list of security violations by IP address, forcing
companies to spend time matching addresses with names,
Juniper does all that work for them. That helps promote
more-fruitful discussions between IT and business units about
security, according to Christiansen.
“The intent is not to punish but to collaborate with the busi-
ness units to change people’s behavior in a positive way,” he
explains.
With a Juniper Simply Connected solution, businesses can:
	 Create policies only once, across wired, wireless and
remote access networks, including extensive device
coverage for both BYOD and IT-managed devices,
delivering consistent, secure access with Web 2.0
application visibility and control.
	 Juniper AppSecure provides a deep understanding of appli-
cation behaviors and traffic flows to provide protection from
common evasion techniques and malware attacks. It also en-
ables IT to define and enforce application policies and works
with the SRX Series Services Gateway intrusion prevention
system to repel various other forms of attack, including zero-
day attacks for which no attack signature yet exists.
	 Add intelligence to their network with context-aware
policies that are tailored to the security risk, accounting
for the user, device, application and location across the
corporate network of switches, gateways, wireless LANs
and users’ devices.
> Junos Pulse Access Control Service running on a
INSIDE
8 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
5: SECURING THE MOBILE
ENTERPRISE
MAG Series gateway device:
• Ensures that only authorized users gain access to
various network resources, with security policies that
follow them around the globe, accounting for their
location, device or means of accessing the network
and the resources they are trying to reach
• Uses the Junos Pulse client as its common
user interface, minimizing and simplifying client
deployments and saving IT cost and time
	 Choose between client and clientless deployment.
Although clientless deployment is more desired by end
users, who can simply and securely onboard personal
devices without IT intervention, client deployments present
stronger security, by providing control and better protection
for end users’ devices.
> The Junos Pulse Mobile Security Suite, a software as
a service (SaaS) offering, is one of several services that
runs under the Junos Pulse client, a multiservice, mobile
network access, acceleration and security client that
includes security applications ranging from antimalware
and endpoint firewall capabilities to loss and theft
prevention, device management, monitoring and control.
	 Have a holistic approach to enterprise access. Connecting
from outside the enterprise perimeter is as common
today as connecting from within it and is one of the core
elements of a mobile enterprise.
> To secure data in transit to and from mobile devices,
Juniper offers its Secure Access Series SSL VPN Applianc-
es, delivering secure remote access from mobile devices,
laptops and remote desktops to corporate resources.
Deliver a better user experience. Today users are expecting
to have the same experience, if not a better one, in connect-
ing to the corporate network wirelessly than they do through
a wired connection. Juniper delivers a single secure network
for voice, video, data and SOA, providing a foundation for
fast, secure, reliable delivery of applications and supporting
strategic business processes in a mobile network.
> The Juniper Simply Connected portfolio enables a mo-
bile rich media experience to help maximize the power
of the network and ensure quality of experience. The
WLC Series, EX Series and SRX Series don’t require trade-
offs between scale and performance as you change and
evolve your campus. So more locations, more users and
more apps can be accommodated cost-effectively.
Provide always-on mobility with robust design capabilities
to enable connectivity for on-demand business applications,
fewer devices, simplified management and more automa-
tion. Customers will be able to deploy mission-critical
applications on a dependable network, with seamless
scalability across wired and wireless connections, thereby
futureproofing their investment.
Conclusion
Mobility is a requirement in today’s enterprises, something
employees have come to expect and rely on. But the mobile
environment must be secured in a way that users don’t find
intrusive but that IT knows is sound. With its extensive lineup of
scalable, simple-to-use tools and services, Juniper can help.
Controls and Policies
“What people really want is a single set of controls
and policies so they can normalize the mobile
security environment across multiple heterogeneous
device types and operating environments.”
—Chris Christiansen, program vice president, IDC
INSIDE
9 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
Flatter networks deliver better
performance for any devices
and applications
As more network traffic moves between servers, data center architects
need to rethink and retool network fundamentals.
Users are becoming ever more mobile, employing
a multitude of devices, from smartphones to
tablets, to access corporate data and applications.
CIOs understand the value mobility can bring to
their businesses but are faced with a challenge:
ensuring the devices deliver a quality user
experience no matter which applications
users employ.
Given the demands of the user base—which
includes not only internal employees but also
guests, contractors, suppliers and others—that
challenge is significant, says Mike Spanbauer,
principal analyst, Data Center Technology and
Enterprise Networks, at the consulting firm
Current Analysis. “These applications are being
accessed from everywhere in real time, and user
expectations are higher than ever,” he says. “It’s
like trying to satisfy a bunch of teenagers who are exceptionally demanding, unforgiving and very savvy.”
Although certain aspects of the performance of mobile applications rest with wireless service providers, the
enterprise wireless LAN, data center and application architecture also play a large role in ensuring good performance
for mobile applications.
INSIDE
10 of 11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
10
Meeting the Wireless Challenge
Enterprise networks, which were originally architected for
wired clients, are now being asked to support more wireless
devices than wired ones, which leads to two big changes, says
Abner Germanow, senior director of enterprise marketing at
Juniper Networks:
	 The wireless LAN needs to become more robust
and reliable.
	 The wired network doesn’t need as many access ports, but
it needs to support more traffic, due to the increase in the
number of devices connecting to it and the constant march
of more network-intensive applications.
The challenge for IT is to strike the right balance of wired
vs. wireless networks and ensuring that they are reliable,
scalable and secure, Germanow says.
Rethinking Legacy Architecture
Traditional enterprise networks were designed for wired
devices. When all devices were physically connected to
the LAN, having many ports and many connections was
key to enabling connectivity and performance. This is no
longer the case. Enterprise networks now need to deliver
the required performance to deliver mobility applications
on any device. On the enterprise network, delivering high
performance to any device and application presents two
key requirements:
	 Wired networks no longer need to be designed to
maximize the number of ports they deliver, but to
maximize the performance of the applications they support.
	 Because connectivity needs to be delivered to any device
anywhere on the network, flexibility and scalability is
critical to the design of any network. Therefore, simplifying
the architecture of the wired network is essential to
delivering mobile connectivity. Collapsing tiers by
virtualizing network resources and limiting the number
of wired connections is essential to delivering flexibility
and scalability to enable mobility.
	 To deal with the proliferation of mobile devices and
applications, the wired network must also optimize
personnel resources. Automation and management
simplification are essential. For instance, companies need
to reduce the number of independently managed devices
by virtualizing devices, and implementing automation
technologies such as auto-discover, auto-configure and
pre-emptive fault notification capabilities.
Traditional data center network architectures are also
optimized for client/server applications, in which a single
server delivers an application to a given client across a local-
or wide-area network. This is “north-south” network traffic,
or server to client, for the most part. For the past decade
or so, companies have been moving to more of a service-
oriented architecture (SOA), in which applications are far
more distributed, Germanow says. In a SOA environment,
an application may call upon many different components to
complete a single request. This is “east-west” network traffic,
or server-to-server.
“Where you put the components has a direct impact on
the performance of the application,” Germanow says. Say you
have 100 different components that can mix and match to
create different applications. If components one through five
exist on servers located on the same rack, any application that
requires only those components will get good performance.
But if components 95 through 100 live on the other side
of the data center and they need to be combined with one
through five, performance can suffer greatly, because the
request will have to travel across multiple tiers of the three-tier
architecture—access, aggregation and core—common
in client/server environments.
INSIDE
11
CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK
PRESENTED BY
1: BUILDING THE ANYTIME,
ANYWHERE NETWORK
5: SECURING THE MOBILE
ENTERPRISE
9:	FLATTER NETWORKS DELIVER
	 BETTER PERFORMANCE
	 FOR ANY DEVICES AND
	 APPLICATIONS
of 11
11
Flattening the Tiers
The reason the three-tier architecture evolved was mainly
the limited port density of network switches, Spanbauer
says. Once all the ports were consumed at one tier, traffic
had to be shuttled up to a higher tier. But now vendors are
offering switches with greater port densities, which changes
the equation. For the last three years, for example, Juniper
has been offering EX Series switches, which support as
many as 384 Gigabit Ethernet ports at wire speed in a single
switch. What’s more, up to 3072 Gigabit Ethernet ports
can be managed in one single virtual switch. “You can get
some pretty impressive port density out at the edge with low
oversubscription ratios,” Spanbauer says.
EX Series switches with Virtual Chassis are intended to
enable companies to do away with the aggregation layer of
switches, Germanow says. “That removes about 30 percent
of the equipment and optimizes traffic between racks,” he
says. “It works really well in a Gigabit Ethernet or mixed
1G/10G environment.”
Companies that require performance and efficiency for 10G
environments can now opt for Juniper QFabric Series data-
center fabric technology. Customers can build a switch with
as many as 6,100 ports—creating a one-tier architecture—
Spanbauer says.
“That optimizes application-to-application and server-
to-server communications where one node talks directly to
another,” he says. “Your network architecture is no longer
dictating your data flows.”
Service Provider Connection
Another element critical for good mobile application
performance is the connection to the service provider and
ensuring traffic is prioritized appropriately, Spanbauer notes.
Although enterprises can’t control what goes on inside the
service provider network, they can establish service-level
agreements to establish what’s expected.
“Control what you can, manage what you must and
architect for optimal deployment within your sphere of
control,” he advises. With its Junos operating system deployed
across its entire product line, Juniper delivers operational
benefits that help make it easier to control and manage the
network, he says.
It’s also a good idea to consider the physical location of the
data center and its proximity to your carrier’s point of presence
or even to collocate with the provider, Germanow says.
Deciding Where Data Lives
Companies also have to consider how many of their mobile
applications will live on the mobile device, as opposed to on
a server in the data center, Germanow adds. If users employ
predominantly a 3G network, it may make sense to store more
data on the device to minimize the need to connect to the
remote server. But as users migrate to a 4G network, they may
be able to access the data just as quickly over the network
as they could if it were local. In such a case, it makes sense
to store it in the data center, where IT can provide better
security, Germanow says.
Such changing network capabilities also point to the need
for a flexible data center architecture. “The pace at which
your applications evolve is faster than the pace at which
your infrastructure will evolve,” Germanow says. “Ultimately,
you need to build infrastructure that doesn’t hold you back
as application requirements change and the devices and
networks they have access to evolve.”

Weitere ähnliche Inhalte

Was ist angesagt?

Security that works
Security that worksSecurity that works
Security that worksJames1280
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTTekRevol LLC
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
The Financial Impact of BYOD
The Financial Impact of BYODThe Financial Impact of BYOD
The Financial Impact of BYODCisco Services
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondJ
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Wireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedWireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedJack Voth
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemicLora Berr
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...eraser Juan José Calderón
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICEMicrosoft India
 
20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike20141110_SDBJ interview of Mike
20141110_SDBJ interview of MikeMichael Mossbarger
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 

Was ist angesagt? (19)

Security that works
Security that worksSecurity that works
Security that works
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENTHOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
HOW FUTURISTIC TECHNOLOGY CAN CHANGE FUTURE OF MOBILE APP DEVELOPMENT
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
The Financial Impact of BYOD
The Financial Impact of BYODThe Financial Impact of BYOD
The Financial Impact of BYOD
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Aerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyondAerohive whitepaper-byod-and-beyond
Aerohive whitepaper-byod-and-beyond
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
The Secret to Surviving the Network Deluge
The Secret to Surviving the Network DelugeThe Secret to Surviving the Network Deluge
The Secret to Surviving the Network Deluge
 
Wireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL SanatizedWireless in the Workplace - White Paper - FINAL Sanatized
Wireless in the Workplace - White Paper - FINAL Sanatized
 
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...
 
10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic10 technology trends to watch in the COVID- 19 pandemic
10 technology trends to watch in the COVID- 19 pandemic
 
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
Covid-19 and IoT: Some Perspectives on the Use of IoT Technologies in Prevent...
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike20141110_SDBJ interview of Mike
20141110_SDBJ interview of Mike
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 

Andere mochten auch

How enterprise mobility changed the business scenario
How enterprise mobility changed the business scenarioHow enterprise mobility changed the business scenario
How enterprise mobility changed the business scenarioSoftweb Solutions
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Building Enterprise Mobility Strategy
Building Enterprise Mobility StrategyBuilding Enterprise Mobility Strategy
Building Enterprise Mobility StrategySubhamoy Chakraborti
 
Mobile Strategy: Be in control
Mobile Strategy: Be in controlMobile Strategy: Be in control
Mobile Strategy: Be in controlCapgemini
 
Enterprise Mobility - The breakdown
Enterprise Mobility - The breakdownEnterprise Mobility - The breakdown
Enterprise Mobility - The breakdownTkXel
 
MobConf 2016 - Global Adoption Trends for Mobility
MobConf 2016 - Global Adoption Trends for MobilityMobConf 2016 - Global Adoption Trends for Mobility
MobConf 2016 - Global Adoption Trends for MobilityPraveen Nair
 
Overview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioOverview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioIQVIA
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise MobilityYuvaraj Ilangovan
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)TkXel
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility StrategyFreeform Dynamics
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachRapidValue
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015DMI
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategyAjit Gokhale
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Mobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalMobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalEmergence Capital
 

Andere mochten auch (17)

How enterprise mobility changed the business scenario
How enterprise mobility changed the business scenarioHow enterprise mobility changed the business scenario
How enterprise mobility changed the business scenario
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Building Enterprise Mobility Strategy
Building Enterprise Mobility StrategyBuilding Enterprise Mobility Strategy
Building Enterprise Mobility Strategy
 
Mobile Strategy: Be in control
Mobile Strategy: Be in controlMobile Strategy: Be in control
Mobile Strategy: Be in control
 
Enterprise Mobility - The breakdown
Enterprise Mobility - The breakdownEnterprise Mobility - The breakdown
Enterprise Mobility - The breakdown
 
MobConf 2016 - Global Adoption Trends for Mobility
MobConf 2016 - Global Adoption Trends for MobilityMobConf 2016 - Global Adoption Trends for Mobility
MobConf 2016 - Global Adoption Trends for Mobility
 
Overview of IBM Mobility Portfolio
Overview of IBM Mobility PortfolioOverview of IBM Mobility Portfolio
Overview of IBM Mobility Portfolio
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
Enterprise Mobility - Strong Mobile Strategy (7 steps to get you started)
 
Enterprise Mobility Strategy
Enterprise Mobility StrategyEnterprise Mobility Strategy
Enterprise Mobility Strategy
 
Enterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approachEnterprise mobility, strategy and execution approach
Enterprise mobility, strategy and execution approach
 
Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015Top 8 Enterprise Mobility Trends 2015
Top 8 Enterprise Mobility Trends 2015
 
Build a successful enterprise mobility strategy
Build a successful enterprise mobility strategyBuild a successful enterprise mobility strategy
Build a successful enterprise mobility strategy
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Mobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalMobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence Capital
 
Enterprise Mobility Solutions & Services
Enterprise Mobility Solutions & ServicesEnterprise Mobility Solutions & Services
Enterprise Mobility Solutions & Services
 

Ähnlich wie Building the Anytime, Anywhere Network (CIO Playbook

271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docxlorainedeserre
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Samir Kotarwar
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Securityarms8586
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...PacketTrap Msp
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudAntenna Software
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Networks
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Rick Bouter
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Capgemini
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 

Ähnlich wie Building the Anytime, Anywhere Network (CIO Playbook (20)

271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...Choosing the right network management solution: Increase network visibility t...
Choosing the right network management solution: Increase network visibility t...
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Harnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile CloudHarnessing the Power of the Mobile Cloud
Harnessing the Power of the Mobile Cloud
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...Securing the internet of things opportunity putting cybersecurity at the hear...
Securing the internet of things opportunity putting cybersecurity at the hear...
 
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
Securing the Internet of Things Opportunity: Putting Cybersecurity at the Hea...
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Why Managing Mobility Matters
Why Managing Mobility MattersWhy Managing Mobility Matters
Why Managing Mobility Matters
 

Mehr von Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

Mehr von Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Kürzlich hochgeladen

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Kürzlich hochgeladen (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Building the Anytime, Anywhere Network (CIO Playbook

  • 1. INSIDE 1 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 1: BUILDING THE ANYTIME, ANYWHERE NETWORK Building the Anytime, Anywhere Network Mobile technologies are opening enormous new business opportunities. Capitalizing on them takes a new approach to networking. Bask Iyer remembers the days when only the chosen few enjoyed access to mobile technologies. “It was limited to road warriors and executives,” says Iyer, senior vice president and CIO of Sunnyvale, Calif.-based Juniper Networks Inc. That was then, however. “Today mobility is no longer just for the privileged,” Iyer observes. “It’s available to everybody.” As a result, mobile form factors are no longer something that Juniper’s IT department merely accommodates when creating new applications. “They’re the key interaction point,” Iyer says. “We pay closer attention to the mobile experience these days than we do to the PC experience.” And Juniper is hardly alone. In the span of just a few short years, smartphones, tablets and other mobile devices have redefined the technological mainstream. Practically everyone now relies on them to stay connected with people, applications and information everywhere and all the time. For the businesses these users work for and buy from, the upshot is an unprecedented range of opportunities for competitive differentiation, enhanced productivity and increased agility—opportunities they ignore at their peril. “If you’re not thinking about new ways of leveraging mobility to make your people more efficient or to expand your customer base, it’s a safe bet that your competitors are,” says Iyer’s colleague Abner Germanow, Juniper’s director of enterprise marketing. For corporate IT, capitalizing on mobility’s potential means exchanging ironfisted control over access and devices for a more flexible approach. IT must balance firm administrative oversight with the freedom today’s knowledge workers need to innovate in the anytime, anywhere economy. And making that demanding transition without compromising
  • 2. INSIDE 2 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 1: BUILDING THE ANYTIME, ANYWHERE NETWORK security in the process means nothing less than embracing a totally new approach to building and managing networks. Unprecedented Opportunity The numbers alone provide a sense of the extent to which mobile devices have joined desktops and laptops as everyday technologies. Manufacturers shipped 461.5 million smartphones and some 63.6 million tablet devices worldwide in 2011, according to estimates from analysts at Gartner Inc. Collectively, that’s over 44 percent more than the 364 million PCs Gartner expected computer makers to sell in 2011. Furthermore, it’s not just CEOs and gadget lovers snapping up all that mobile hardware. It’s practically everyone. Indeed, by 2015 more than 200 million U.S. consumers will have a smartphone, tablet or both, according to research firm In- Stat. That’s roughly 65 percent of everyone in the U.S. And it is becoming increasingly common for people to use multiple devices. Indeed, 52 percent of global information workers currently utilize three or more smart devices at the office, according to data from Forrester Research Inc., of Cambridge, Mass., while an incredible 14 percent juggle six or more devices. Not surprisingly, with handheld devices becoming ubiquitous in people’s private lives, mobile users are rapidly becoming the norm rather than the exception at work. In fact, 69 percent of corporate workers access business applications via a personal smartphone, and nearly 10 percent use a personal tablet for business purposes, according to data from Framingham, Mass.- based analyst firm IDC. The upshot, for companies that encourage mobility rather than resist it, has been a dramatically more productive workforce. Armed with speedy devices and connectivity everywhere they go, employees can function effectively anywhere and anytime. Mobility is also transforming the way companies engage with customers. “Businesses that have traditionally had an arm’s length relationship with customers can now connect with them wherever they go, through mobile apps that enable people to place orders, check product availability, or utilize loyalty points,” notes Germanow. And with handsets and the networks they run on becoming more sophisticated all the time, even-more-innovative services will soon be possible. “We’ll eventually see mobile phones that are smart enough to see that you’re headed to a meeting someplace where parking is limited and proactively offer to reserve you a spot,” Germanow says. Technical Headaches For IT departments, the meteoric rise of mobility has created a range of significant challenges. Among the most commonly recognized is the need to extend the security policies they enforce inside the firewall to people and devices outside it. “A wired network user is typically static,” observes Rohit Mehra, director of enterprise communications infrastructure at IDC. Mobile users, by contrast, may be connecting from anywhere on any of several devices, each of which may use a different operating system. To further complicate matters, cybercrooks are increasingly employing PC-style malware to attack smartphones and tablets. The number of viruses targeting the Google Android platform alone rose an astonishing 3,325 percent in the last seven months of 2011, according to a Juniper Global Threat Center study, and hackers have begun adapting viruses and spyware originally developed for PCs to target mobile devices. Yet the management systems many companies rely on give them little to no visibility into which apps are accessing their network or what those systems are doing. Then there are the dangers associated with rogue wireless hotspots that surreptitiously collect user credentials, and with mobile apps that contain hidden malware. In fact, a 2011 study by the Juniper Global Threat Center found that 14.7 percent of mobile apps request user permissions that can be
  • 3. 3 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS INSIDE 1: BUILDING THE ANYTIME, ANYWHERE NETWORK used to place a call without a user’s knowledge or approval, 4.8 percent are able to send a short message service (SMS) message without user authorization, and 30 percent can obtain a device’s location without approval. Coping with the loss or theft of devices is an equally urgent problem. For example, over the course of 2011, 17 percent of companies using Juniper’s Junos Pulse Mobile Security Suite utilized the “locate” command to find a missing device, while over six percent employed the system’s lock feature to guard against unauthorized use of a lost or stolen device, according to data submitted to Juniper by its customers. In addition, users accessing streaming media and corporate applications via Wi-Fi hotspots and legacy mobile networks often face latency headaches. With scores of devices simultaneously transmitting data across the network, businesses are struggling to keep performance levels high and provide resilient, always-on connectivity to mobile users. And with more and more employees using personal mobile devices at the office as well as on the road, corporate wireless networks are experiencing traffic snarls as well. “You can definitely have some performance hits,” says Chris Boykin, vice president of professional services at Future Com Ltd., a provider of network and security solutions based in Bedford, Texas. “Everybody’s sharing that bandwidth.” (For further discussion of mobility-related bandwidth constraints, see “Flatter networks deliver better performance for any devices and applications” on page 9). Freedom and Control One thing is for certain: Limiting users to corporate-provided or -approved devices is no longer an option. “If you block the users, you just force all this stuff underground and you may not have a clue where your data is going,” observes Gartner vice president and distinguished analyst Ken Dulaney. “If you at least know about the problem, you can manage it.” Moreover, companies that bar employees from bringing personal mobile devices to the office are likely to have trouble attracting and retaining top recruits. Managing the mobility problem successfully, however, takes a network capable of giving mobile users the freedom they crave while also providing IT managers the control they need to keep their company’s infrastructure and data safe. Among the core qualities networks must share are robust security, resilience, and device administration functionality, including features that defend against virulent malware on day zero. Networks must ensure mobile-device security mechanisms are used, protect communications from interception, and remotely locate, track, lock and wipe clean lost and stolen devices to protect sensitive personal and corporate data. The ability to enable consistently strong performance and nonstop seamless roaming while supporting a wide range of applications, device types, manufacturers, and operating systems over Wi-Fi as well as mobile networks is another must. Significantly, this applies as much to wired infrastructures as it does to wireless networks, since the wired network is the mobile network’s backbone. Though people often assume adding bandwidth will enable them to meet application and device connectivity needs, this is usually a costly, cumbersome, and inflexible solution. What’s needed is a wired network architecture flexible enough to scale smoothly while delivering reliable connectivity and high performance. It must also be simple and powerful enough to pool and allocate network resources efficiently, so organizations can virtualize devices and manage large and growing environments with existing personnel. This, in turn, enables them to optimize their IT investments. Today’s networks also need more advanced features, including the ability to enforce security policies differently, depending on who the users are, what devices they’re using, what applications they’re using, where they’re located, and how
  • 4. INSIDE 4 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 1: BUILDING THE ANYTIME, ANYWHERE NETWORK they’re accessing the network and its data. For example, some IT organizations consider mobile devices such as smartphones and tablets less secure and easier to lose or steal than laptops; others consider public networks inherently riskier than private ones. As a result, companies must equip their network to apply more rigorous controls to a smartphone or a tablet connecting to business applications from an airport via a free hotspot than to a notebook connecting from inside a conference room at corporate HQ. They also need the ability to identify, monitor, and analyze dozens or hundreds of mobile apps in real time, and classify them based on variables like who is using them, how much risk they pose, and what data they’re accessing. Furthermore, administrators need the ability to define security policies centrally yet enforce them at the point of network access or directly on mobile devices. “The enforcement should be distributed. The policy should be centralized,” observes Edgar Lombera, vice president of engineering and principal architect at Torrey Point Group LLC, a networking consultancy headquartered in Sunnyvale, Calif. That way, companies can enjoy both the simplicity of consolidated rules and the efficiency of applying those rules simultaneously at multiple places near where users are working. Mobile-Ready Networks Building a network capable of delivering all these capabilities takes a series of technologies designed from the ground up for the needs of the mobilized enterprise: Coordinated, granular, context-based security software that enforces policies consistently and continuously at the connection level across wired, wireless, and remote access networks, anywhere and anytime, while providing robust remote data wiping and access rights management capabilities. Network systems that provide a consistent experience for both users and IT across voice, video, data, presence, and service-oriented architecture by ensuring wired-like performance and seamless scalability across wired and wireless networks. Network management solutions that utilize a single client application for mobile device management, mobile security, SSL VPN, wireless provisioning, and network access. Comprehensive access technologies with real-time automation that provide a foundation for fast, secure, and reliable application delivery not only to all users but to all of their devices, including guest, BYOD, and IT- owned hardware. Network device virtualization technologies that simplify a network architecture sufficiently to manage device proliferation without inflating personnel resources, enhance device performance enough to support rich media and mobility applications, and easily scale to enable architecture flexibility and support an explosion in mobile devices and applications on the network. Needless to say, equipping the network with these kinds of solutions won’t be an overnight process for most companies. Those that invest the time and effort anyway, however, are likely to find the rewards worthwhile. “Opportunities to create new services and disrupt existing business models by using mobile devices are appearing every day,” Germanow says. It will be companies with truly mobile-ready networks that capitalize on them first—and profit from them the most. BYOD Companies that bar employees from bringing personal mobile devices to the office are likely to have trouble attracting and retaining top recruits.
  • 5. INSIDE 5 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS Securing the Mobile Enterprise Today’s mobile landscape requires companies to apply highly granular security policy, based on the user, device, location, time and application. Enterprises are becoming relentlessly mobile, with employees of all stripes carrying not just one but likely two or three devices with which they want to connect to the network at various times. Maybe it’s an Apple iPad for meetings in the office or on the road, a laptop from home or the coffee shop and a smartphone from anywhere in between. Although there’s little question that enabling employees to use the device of their choice to access the data and applications they need makes them more productive—not to mention happier—the practice does present a significant security challenge for IT. There’s no denying that using mobile devices for business means that sensitive, critical corporate data and intellectual property have to be secured. And it’s not just the device that has to be secured; it’s also the connection between the device and the company network or corporate cloud as well as the various applications in use. What’s more, IT needs a way to ensure that only authorized users are using the devices and accessing corporate resources. Wanted: A New Approach to Mobile Security Meeting all enterprise objectives requires companies to take a new approach to mobile security, one that looks at security on a per-person rather than a device-specific basis. “Devices are ephemeral; people aren’t,” says Chris Christiansen, program vice president of IDC’s Security Products and Services group. “And device identity doesn’t help when a device is stolen, lost or misplaced or an unauthorized person is using it.” The goal is to have people’s security profile follow them as they move among different locations and use different devices and applications. Security is provided for each device and the security profile dictates what each user can—and cannot—do with each one, taking into account criteria including where the user is and the application in use. At the same time, the approach can’t be intrusive; if users find security getting in the way of their day-to-day tasks, they will find a way around it.
  • 6. INSIDE 6 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 5: SECURING THE MOBILE ENTERPRISE Respondents to IDC’s “2011 Mobile Enterprise Software Survey” neatly outlined the requirements they deem most important in a mobile device management system. Security was clearly a top concern, with software patches and updates the top requirement, followed closely by policy enforcement, remote device wipe/lock and application blacklisting/ whitelisting (see Figure 1). Pervasive Security At the simplest level, Christiansen says, providing that kind of pervasive security means looking at the issue from a “to, from and in” perspective: When you send data to the device, can you authenticate the information and confirm that it is coming from a legitimate source? When data is coming from the device, can you confirm that the data hasn’t been changed, the sender is authenticated to send it and there’s a high level of trust in the information? When data is in the device or on a server, do you have assurance that it is stored correctly and hasn’t been co-opted by another application, such as malware? Providing proper authentication increasingly means two- factor authentication, in which users employ something they have (which may be the device itself or a third-party token) and something they know, such as a password. Protecting data on the device also means being able to lock the device or provide a “kill pill” to remotely wipe all data if the device is lost or stolen. Organizations also want to control which applications users can download, to protect against the malware that is increasingly targeting mobile applications, particularly Android devices. Even if such malware doesn’t succeed in infecting the device itself, Christiansen warns, the device may be used as a vector to pass malware along to other devices. Devising a Security Policy Addressing these security requirements necessitates policies to cover various user groups and requires enforcement mechanisms to ensure that the policies are carried out. The groups include not only internal constituencies but also source: IDC’s Mobility Enterprise Software Survey, 2011 FIGURE 1 The most important features for an organization as it relates to mobile device management system. Software patches, updates Policy enforcement Software delivery Remote device wipe/lock Backup and restore Security features such as encryption, application white/ black listing Help desk support/ troubleshooting Provisioning/ bootstrapping new devices 0 10 20 30 40 50 60 (% of respondents)
  • 7. INSIDE 7 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 5: SECURING THE MOBILE ENTERPRISE visitors, customers, partners, and increasingly, contractors. For example, policies may allow employees to use their own devices at work so long as they agree to secure the device with a password and agree that the company reserves the right to wipe the e-mail account and certain data if the device is compromised. In terms of applications, companies have to determine which ones won’t be allowed (blacklisting) or, more often, simply define which applications are allowed (whitelisting) and deny all others. The list of acceptable applications will naturally vary, depending on the user group. Also, companies should be able to set a policy that precludes the use of certain mobile features and functions—such as the device’s camera—if the device is used in an area of the company where sensitive information is stored. Similarly, perhaps the marketing group is allowed to access Web applications such as Facebook, but only for work-related purposes—meaning they can’t use it to play games. And all policies for mobile devices have to sync with the company’s overall IT security policies; you shouldn’t be reinventing the wheel. “What people really want is a single set of controls and policies so they can normalize the mobile security environment across multiple heterogeneous device types and operating environments,” Christiansen says. The Juniper Approach In short, customers need a solution that covers all sorts of mobile requirements, from casual consumer activity to business-critical applications, but without layers of complexity. Customers need mobile security that is at once simple to implement and operate and also effective. That’s what Juniper’s Simply Connected portfolio is all about. Simply Connected is a collection of integrated security, switching and wireless products that enables customers to build a secure, scalable, highly available solution for both company- and employee-owned devices. Simply Connected products enable companies to create security policies once and apply them across wired, wireless and remote access networks, in a context-aware fashion delivering holistic and coordinated security for all enterprise network access. For example, whereas security reports might formerly have provided a list of security violations by IP address, forcing companies to spend time matching addresses with names, Juniper does all that work for them. That helps promote more-fruitful discussions between IT and business units about security, according to Christiansen. “The intent is not to punish but to collaborate with the busi- ness units to change people’s behavior in a positive way,” he explains. With a Juniper Simply Connected solution, businesses can: Create policies only once, across wired, wireless and remote access networks, including extensive device coverage for both BYOD and IT-managed devices, delivering consistent, secure access with Web 2.0 application visibility and control. Juniper AppSecure provides a deep understanding of appli- cation behaviors and traffic flows to provide protection from common evasion techniques and malware attacks. It also en- ables IT to define and enforce application policies and works with the SRX Series Services Gateway intrusion prevention system to repel various other forms of attack, including zero- day attacks for which no attack signature yet exists. Add intelligence to their network with context-aware policies that are tailored to the security risk, accounting for the user, device, application and location across the corporate network of switches, gateways, wireless LANs and users’ devices. > Junos Pulse Access Control Service running on a
  • 8. INSIDE 8 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 5: SECURING THE MOBILE ENTERPRISE MAG Series gateway device: • Ensures that only authorized users gain access to various network resources, with security policies that follow them around the globe, accounting for their location, device or means of accessing the network and the resources they are trying to reach • Uses the Junos Pulse client as its common user interface, minimizing and simplifying client deployments and saving IT cost and time Choose between client and clientless deployment. Although clientless deployment is more desired by end users, who can simply and securely onboard personal devices without IT intervention, client deployments present stronger security, by providing control and better protection for end users’ devices. > The Junos Pulse Mobile Security Suite, a software as a service (SaaS) offering, is one of several services that runs under the Junos Pulse client, a multiservice, mobile network access, acceleration and security client that includes security applications ranging from antimalware and endpoint firewall capabilities to loss and theft prevention, device management, monitoring and control. Have a holistic approach to enterprise access. Connecting from outside the enterprise perimeter is as common today as connecting from within it and is one of the core elements of a mobile enterprise. > To secure data in transit to and from mobile devices, Juniper offers its Secure Access Series SSL VPN Applianc- es, delivering secure remote access from mobile devices, laptops and remote desktops to corporate resources. Deliver a better user experience. Today users are expecting to have the same experience, if not a better one, in connect- ing to the corporate network wirelessly than they do through a wired connection. Juniper delivers a single secure network for voice, video, data and SOA, providing a foundation for fast, secure, reliable delivery of applications and supporting strategic business processes in a mobile network. > The Juniper Simply Connected portfolio enables a mo- bile rich media experience to help maximize the power of the network and ensure quality of experience. The WLC Series, EX Series and SRX Series don’t require trade- offs between scale and performance as you change and evolve your campus. So more locations, more users and more apps can be accommodated cost-effectively. Provide always-on mobility with robust design capabilities to enable connectivity for on-demand business applications, fewer devices, simplified management and more automa- tion. Customers will be able to deploy mission-critical applications on a dependable network, with seamless scalability across wired and wireless connections, thereby futureproofing their investment. Conclusion Mobility is a requirement in today’s enterprises, something employees have come to expect and rely on. But the mobile environment must be secured in a way that users don’t find intrusive but that IT knows is sound. With its extensive lineup of scalable, simple-to-use tools and services, Juniper can help. Controls and Policies “What people really want is a single set of controls and policies so they can normalize the mobile security environment across multiple heterogeneous device types and operating environments.” —Chris Christiansen, program vice president, IDC
  • 9. INSIDE 9 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS Flatter networks deliver better performance for any devices and applications As more network traffic moves between servers, data center architects need to rethink and retool network fundamentals. Users are becoming ever more mobile, employing a multitude of devices, from smartphones to tablets, to access corporate data and applications. CIOs understand the value mobility can bring to their businesses but are faced with a challenge: ensuring the devices deliver a quality user experience no matter which applications users employ. Given the demands of the user base—which includes not only internal employees but also guests, contractors, suppliers and others—that challenge is significant, says Mike Spanbauer, principal analyst, Data Center Technology and Enterprise Networks, at the consulting firm Current Analysis. “These applications are being accessed from everywhere in real time, and user expectations are higher than ever,” he says. “It’s like trying to satisfy a bunch of teenagers who are exceptionally demanding, unforgiving and very savvy.” Although certain aspects of the performance of mobile applications rest with wireless service providers, the enterprise wireless LAN, data center and application architecture also play a large role in ensuring good performance for mobile applications.
  • 10. INSIDE 10 of 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS 10 Meeting the Wireless Challenge Enterprise networks, which were originally architected for wired clients, are now being asked to support more wireless devices than wired ones, which leads to two big changes, says Abner Germanow, senior director of enterprise marketing at Juniper Networks: The wireless LAN needs to become more robust and reliable. The wired network doesn’t need as many access ports, but it needs to support more traffic, due to the increase in the number of devices connecting to it and the constant march of more network-intensive applications. The challenge for IT is to strike the right balance of wired vs. wireless networks and ensuring that they are reliable, scalable and secure, Germanow says. Rethinking Legacy Architecture Traditional enterprise networks were designed for wired devices. When all devices were physically connected to the LAN, having many ports and many connections was key to enabling connectivity and performance. This is no longer the case. Enterprise networks now need to deliver the required performance to deliver mobility applications on any device. On the enterprise network, delivering high performance to any device and application presents two key requirements: Wired networks no longer need to be designed to maximize the number of ports they deliver, but to maximize the performance of the applications they support. Because connectivity needs to be delivered to any device anywhere on the network, flexibility and scalability is critical to the design of any network. Therefore, simplifying the architecture of the wired network is essential to delivering mobile connectivity. Collapsing tiers by virtualizing network resources and limiting the number of wired connections is essential to delivering flexibility and scalability to enable mobility. To deal with the proliferation of mobile devices and applications, the wired network must also optimize personnel resources. Automation and management simplification are essential. For instance, companies need to reduce the number of independently managed devices by virtualizing devices, and implementing automation technologies such as auto-discover, auto-configure and pre-emptive fault notification capabilities. Traditional data center network architectures are also optimized for client/server applications, in which a single server delivers an application to a given client across a local- or wide-area network. This is “north-south” network traffic, or server to client, for the most part. For the past decade or so, companies have been moving to more of a service- oriented architecture (SOA), in which applications are far more distributed, Germanow says. In a SOA environment, an application may call upon many different components to complete a single request. This is “east-west” network traffic, or server-to-server. “Where you put the components has a direct impact on the performance of the application,” Germanow says. Say you have 100 different components that can mix and match to create different applications. If components one through five exist on servers located on the same rack, any application that requires only those components will get good performance. But if components 95 through 100 live on the other side of the data center and they need to be combined with one through five, performance can suffer greatly, because the request will have to travel across multiple tiers of the three-tier architecture—access, aggregation and core—common in client/server environments.
  • 11. INSIDE 11 CIO PLAYBOOK: BUILDING THE ANYTIME, ANYWHERE NETWORK PRESENTED BY 1: BUILDING THE ANYTIME, ANYWHERE NETWORK 5: SECURING THE MOBILE ENTERPRISE 9: FLATTER NETWORKS DELIVER BETTER PERFORMANCE FOR ANY DEVICES AND APPLICATIONS of 11 11 Flattening the Tiers The reason the three-tier architecture evolved was mainly the limited port density of network switches, Spanbauer says. Once all the ports were consumed at one tier, traffic had to be shuttled up to a higher tier. But now vendors are offering switches with greater port densities, which changes the equation. For the last three years, for example, Juniper has been offering EX Series switches, which support as many as 384 Gigabit Ethernet ports at wire speed in a single switch. What’s more, up to 3072 Gigabit Ethernet ports can be managed in one single virtual switch. “You can get some pretty impressive port density out at the edge with low oversubscription ratios,” Spanbauer says. EX Series switches with Virtual Chassis are intended to enable companies to do away with the aggregation layer of switches, Germanow says. “That removes about 30 percent of the equipment and optimizes traffic between racks,” he says. “It works really well in a Gigabit Ethernet or mixed 1G/10G environment.” Companies that require performance and efficiency for 10G environments can now opt for Juniper QFabric Series data- center fabric technology. Customers can build a switch with as many as 6,100 ports—creating a one-tier architecture— Spanbauer says. “That optimizes application-to-application and server- to-server communications where one node talks directly to another,” he says. “Your network architecture is no longer dictating your data flows.” Service Provider Connection Another element critical for good mobile application performance is the connection to the service provider and ensuring traffic is prioritized appropriately, Spanbauer notes. Although enterprises can’t control what goes on inside the service provider network, they can establish service-level agreements to establish what’s expected. “Control what you can, manage what you must and architect for optimal deployment within your sphere of control,” he advises. With its Junos operating system deployed across its entire product line, Juniper delivers operational benefits that help make it easier to control and manage the network, he says. It’s also a good idea to consider the physical location of the data center and its proximity to your carrier’s point of presence or even to collocate with the provider, Germanow says. Deciding Where Data Lives Companies also have to consider how many of their mobile applications will live on the mobile device, as opposed to on a server in the data center, Germanow adds. If users employ predominantly a 3G network, it may make sense to store more data on the device to minimize the need to connect to the remote server. But as users migrate to a 4G network, they may be able to access the data just as quickly over the network as they could if it were local. In such a case, it makes sense to store it in the data center, where IT can provide better security, Germanow says. Such changing network capabilities also point to the need for a flexible data center architecture. “The pace at which your applications evolve is faster than the pace at which your infrastructure will evolve,” Germanow says. “Ultimately, you need to build infrastructure that doesn’t hold you back as application requirements change and the devices and networks they have access to evolve.”