1. Trang chủ
  2. » Giáo Dục - Đào Tạo

Mobility fundamental series BYOD kho tài liệu bách khoa

33 51 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

BYOD and Beyond Leong See Kay © © 2012 2012 Cisco Cisco and/or and/or its its affiliates affiliates All All rights rights reserved reserved Cisco Confidential •  Why BYOD? An introduction •  BYOD Challenges •  The Cisco BYOD Solution •  BYOD Use Cases •  Summary © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential Device Diversity is here to stay Benefits •  Cost savings •  Workers’ 89% Satisfaction 26% 75% 10% 36% •  Cutting-edge Technologies, latest features and capabilities 22% 1% © 2011 Cisco and/or its affiliates All rights reserved 23% Cisco Public User Wants 89% Consistent experience on multiple devices 2.  Seamless transitions between devices 3.  Separation of work and personal data 4.  Keep up with tech and social trends 26% 75% 10% 1.  36% 22% 1% © 2011 Cisco and/or its affiliates All rights reserved 23% Cisco Public 1.  Providing Device Choice and Support 2.  On-Boarding of New Devices 3.  Maintaining Secure Access to the Corporate Networks 4.  Enforcing Company Usage Policies 5.  Visibility of Devices on the Network 6.  Protecting Data and Loss Prevention 7.  Revoking Access 8.  Potential for New Attack Vectors 9.  Ensuring Wireless LAN Performance and Reliability 10.  Managing the Increase in Connected Devices 11.  Work and Personal Overlap © 2011 Cisco and/or its affiliates All rights reserved Cisco Public BYOD End User I need to allow iPads on my network I need to help my company develop new mobile business models I need a BYOD strategy that aligns with my VDI and workspace needs I need to ensure workers can be CEO more mobile and more productive I need to protect intellectual property and confidential data I need to quickly provide app services to new employees, partners and contractors I need to support multiple device types I need video and voice on virtual desktops Legacy applications don’t run natively without increasing cost or complexity but I can’t compromise the experience on new or mobile operating systems © 2012 Cisco and/or its affiliates All rights reserved I Need a Workspace Strategy CIO Cisco Confidential IT CEO Aspirations, CIO Imperatives and End-User Requirements What if I could speed innovation by opening my network and collaborating with customers and partners… What if I could let my employees have greater freedom and choice… What if I could let my team work their way… © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential NEW WAY OLD WAY •  Enterprise provided and managed user devices EXECUTIVE •  Work is a place you go to—limited off campus access •  IT visibility and control into user devices and applications •  Anywhere, anytime, any device usage •  Work is a function— globally dispersed, mixed device ownership EMPLOYEE •  Change in IT control and management paradigm — granularity beyond device •  Security lives in the network to allow for BYOD •  Security lived on the IT managed endpoint IT © 2011 Cisco and/or its affiliates All rights reserved Cisco Public Compliance Operations Network Team Security Operations Endpoint Team Application Team © 2012 Cisco and/or its affiliates All rights reserved Human Resources Cisco Confidential 10 Truste Wi d Fi 802.11n Wi-Fi IdentityBased Access Control Apply defined policy profiles based on: ü  Device Type ü  User ü  Location ü  Application Mobile Device Management Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved WAN Optimization Service Assurance19 Cisco Confidential 19 Truste Wi d Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 20 20 Truste Wi d Fi 802.11n Wi-Fi §  Location §  Video Optimization §  Spectrum Intelligence §  Client Acceleration IdentityBased Access Control Is Mr Allen’s lab work ready yet? Not yet but i will let you know the moment it arrives Mobile Device Management Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 21 21 Untrusted WiFi Access: Limited Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 22 22 Hotspot 2.0 802.11n Wi-Fi Web/Email Security IdentityBased Access Control VPN Collaboration /UC Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 23 23 Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 24 24 3G/ 4G Access: No YesLimited Electronic Medical Records Mobile TelePresence Email Instant Messenger Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 25 25 3G/ 4G IdentityBased Access Control VPN Intelligent Packet Core Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 26 26 Truste Wi d Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 27 27 Bandwidth Priority Truste Wi d Fi 802.11n Wi-Fi Full Service Home Router Collaboration /UC Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 28 28 Cisco Confidential © 2012 Cisco and/or its affiliates All rights reserved Presentation_ID © 2008 Cisco Systems, Inc All rights reserved Cisco Confidential 29 29 © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential 30 •  BYOD impacts all areas of IT •  Workspace delivery to any device can be native, virtual, or hybrid •  BYOD implementation must address the entire “spectrum” of use cases in an organization Cisco BYOD Solution AnyConnect ScanSafe © 2012 Cisco and/or its affiliates All rights reserved ASA ESA/WSA ISE Wireless Wired Sec Group Access Cisco Prime Cisco Confidential 31 Reduced Burden on IT Staff Device On-Boarding, Self Registration, Supplicant Provisioning Reduced Burden on Help Desk Staff Seamless Intuitive End-User Experience Self Service Model My Device Registration Portal, Guest Sponsorship Portal © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential 32 Thank you © 2012 Cisco and/or its affiliates All rights reserved Cisco Confidential 33 ...•  Why BYOD? An introduction •  BYOD Challenges •  The Cisco BYOD Solution BYOD Use Cases Summary â 2012 Cisco and/or its affiliates All... affiliates All rights reserved Cisco Public BYOD End User I need to allow iPads on my network I need to help my company develop new mobile business models I need a BYOD strategy that aligns with my VDI... Cisco Confidential 12 Device management integrated into unified policy Seamless mobility and anywhere access for secure mobility Unified policy for secure access, detailed visibility and simplified

Ngày đăng: 08/11/2019, 18:01

TỪ KHÓA LIÊN QUAN