BYOD Transforming the Enterprise

1,187 views
1,021 views

Published on

The rules of the game in IT are changing rapidly and companies facing these market transitions are looking for ways to build an intelligent network platform that can help lines of business capture new business opportunities. Cisco Borderless Networks is the architecture that allows enterprise of any size, to leverage technology transitions through our portfolio of services - rich, secure, and efficient products and solutions. Customers are able to connect anyone, anywhere, anytime, and on any device – securely, reliably, and seamlessly.

Published in: Technology, Education
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,187
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

BYOD Transforming the Enterprise

  1. 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2012 Cisco and/or its affiliates. All rights reserved.Toronto, CanadaMay 30, 2013BYOD TransformingThe EnterpriseTom WilburnVP, Cisco Global Enterprise NetworksFollow us on Twitter at #CiscoConnect_TO
  2. 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Industry TrendsCisco’s Network VisionDelivering The BYOD ExperienceAdding Cloud NetworkingAdding Business ValueSDN – Open Network Environment
  3. 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3The Intelligent NetworkMore Innovation and ChangeThan at Any Other Point in Our LifetimeSOCIAL NETWORKSPOWER OF COMMUNITYOPEN APPLICATIONSSaaS CONSUMPTIONACCELERATINGDEVICE INNOVATION CYCLESEXPLOSION OF VIDEOOVER WIRED & WIRELESSNETWORKSPERSONALISEDCOLLABORATIVE WORKSPACEBYODCLOUD ECONOMICSINDUSTRY STANDARDSYSTEMS AND AUTOMATIONVIRTUAL DESKTOP SECURITYAND COMPLIANCE
  4. 4. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4Source: Cisco VNI Mobile Forecast. 2013Figures in legend refer to device/connection share in 2017% Growth300%250%02012 2013 2014 2015 2016 2017200%150%100%50%Device GrowthTablets (46%)Smartphones (20%)M2M (36%)Laptops (11%)% Growth300%250%02012 2013 2014 2015 2016 2017200%150%100%50%Traffic GrowthTablets (113%)Smartphones (81%)M2M (89%)Laptops (31%)Petabytes per Month12,0006,00002011 2012 2013 2014 2015 201610%39%51%29% CAGR 2011-2016Mobile Data (78%)Fixed Wired Data (20%)Fixed Wi-Fi (34%)Cisco VNI Report: The Zettabyte Era, 2012Mobile and Wi-Fi Accelerating, Wired Still Growing
  5. 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5o f o r g a n i z a t i o n s w i l l a l l o wpersonal devices for work use. —Gartner90%
  6. 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6100%of ITis struggling to keepup with mobility trends.—Gartner
  7. 7. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7How You Worked Depended on This…Now It Depends on This…WIRED WIRELESS
  8. 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8Workspace Solutions Must Be Based On Use CaseVirtual Desktop plusEnterprise CollaborativeApplicationsVXI Smart SolutionNative or Web-BasedApplications, SecurelyBYOD Smart SolutionINTELLIGENTNETWORKHybrid ApproachVXI and BYOD
  9. 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 929,864iPhones8,463Android Devices5,658BlackBerry Devices844Other Devices83,099Windows PCs30,990Apple Macs7,269Linux Desktops3,041DesktopVirtualizationTABLET BASED DEVICESMOBILE SMARTPHONE DEVICESDESKTOP LANDSCAPE14,312 iPadsSamsung Tablets146Nexus Tablets
  10. 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10Delivering The BYOD Experience
  11. 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  12. 12. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1212© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  13. 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1313© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  14. 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1414© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  15. 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1515© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDTrustedWiFi Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic PoliciesITUserIdentity BasedAccess ControlMobile DeviceManagement802.11n Wi-FiAt the Office
  16. 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1616© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDWiFiTrustedApply defined policyprofiles based on: Device Type User Location ApplicationIdentity BasedAccess Control
  17. 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1717© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDTrustedWiFiCorporate ApplicationsMobile TelePresenceEmailInstant MessengerYesNoAccess: FULLIdentity BasedAccess ControlMobile DeviceManagement802.11n Wi-Fi Location Voice and VideoOptimization SpectrumIntelligence Client AccelerationAt the Office
  18. 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1818© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDPassPoint802.11nWi-FiWeb/EmailSecurityIdentityBasedAccessControlVPNCollaboration/UCUntrusted WiFiAccess: LimitedCorporate ApplicationsMobile TelePresenceEmailInstant MessengerYesNo
  19. 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1919© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDCorporate ApplicationsMobile TelePresenceEmailInstant MessengerYesNo3G/4GAccess: Limited
  20. 20. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2020© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDCorporate ApplicationsMobile TelePresenceEmailInstant MessengerYesNoTrustedWiFiAccess: FULL
  21. 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2121© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDCollaboration/UC802.11n Wi-FiTrustedWiFiFull ServiceHome RouterBandwidth Priority
  22. 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2222© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  23. 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2323© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_IDOne ManagementOne PolicyOne Network
  24. 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24Cisco’s Network Vision
  25. 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2599%of “things” are unconnectedWe Are Entering the Age of the Internet of EverythingThe Network Is the Platform to Connect the Previously UnconnectedTo Solve for IoE the Network mustUnify for Scale and PerformanceDevices25+ Billion devices by 20157.2+ Billion population by 2015~3.47 devices average per user*Cisco VNI Study 2012Traffic50+% will be wireless by 201550+% will be video by 201550+% Cloud based by 2015SecureScalableBusinessValue
  26. 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27PremiseOne Policy – One Management –One Network – ownership modelCisco Unified AccessTwo ApproachesSimplicity FlexibilityCloudOne Policy – One Management –One Network – subscription model
  27. 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28One Policy Simplified and unified policy definition andenforcement across LAN and WLANOne Management Simplified and unified network and lifecyclemanagement across LAN and WLANOne Network • Simplified and unified operating system andfabric for LAN and WLANCisco Unified AccessPremise modelMaking IT More Responsive to the BusinessLess Time on IT Operations, More Time on IT Business InnovationSimpleSecureBusiness Value
  28. 28. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29End-UserDevicesAccessInfrastructureManagementand TroubleshootingIT FocusPolicyEnforcementLAN Wireless SecurityWired Policies Wireless Policies Guest / VPN PoliciesLAN Mgmt. Wireless Mgmt. Identity Mgmt.Access Switch Access Switch Wireless ControllerAccess PointWireless ControllerAccess PointWired Devices Laptops Mobile Phones Tablets BYOD GrowthBefore Unified AccessAccess Point Access PointApplication Mgmt.
  29. 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30End-UserDevicesAccessInfrastructureManagementand TroubleshootingIT FocusPolicyEnforcementLAN Wireless SecurityLAN Mgmt. Wireless Mgmt. Identity Mgmt.Access Switch Access Switch Wireless ControllerAccess PointWireless ControllerAccess PointWired Devices Laptops Mobile Phones Tablets BYOD GrowthWired Policies Wireless Policies Guest / VPN PoliciesAccess Point Access PointApplication Mgmt.Cisco ISEPrime InfrastructureCatalyst 3850Next Gen IT Next Gen ITOne PolicyOne ManagementOne NetworkWith Cisco Unified AccessNext-Gen ITEnd-UserSimpleSecureUnifiedNew Connected ExperiencesIncreased Productivity
  30. 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31UnifiedAccessArchitecture - PremiseOne Policy, One Management, One NetworkGoodMDMManagerCisco PrimeInfrastructureCiscoCatalystSwitchesWiredNetworkAnyConnect VPNCisco WLANControllerWirelessNetworkIdentity ServicesEngine andTrustSec
  31. 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32One Policy – Cisco Identity Services Engine (ISE)Simplified Policy ManagementContext-AwareComprehensive secureaccess based on Who, What,When, Where, HowCentral PolicyPlatformConsistent policy forLAN, WLAN, and VPNMDM IntegrationCompliance assessment andnetwork access control ofmobile endpoints
  32. 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33Benefits of One PolicySimplified Onboardingvia My Device pageImproves User ExperienceContextual DeviceProfiling and PostureProvides Comprehensive Secure AccessUnified PolicyManagementImproves Operational EfficiencyNetwork Enforcementand Control PointDecreases Operational CostsMobile DeviceManagement(MDM) IntegrationExtends the Reach of Leading MDM Solutions
  33. 33. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34OperationalProductivityLAN and WLAN lifecyclemanagement and assuranceEnd-UserProductivity360 degree view improves userexperience, speeds problem remediationOperationalExcellenceIntegrated best practicesassure consistency andspeeds device rolloutsOne Management – Cisco Prime Infrastructure (PI)Simplified Network Management
  34. 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35Single View of Wired and Wireless Deep Application Visibility and ControlAutomated End-User Troubleshooting User and Device 360° View Integrated Best PracticesBenefits of One Management
  35. 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36One NetworkSimplified Network OperationConverged LANand WLANInfrastructureOne common LAN and WLANfabric optimized for flexibilityand performanceNetwork-WideVisibility andIntelligenceOne common operating systemoptimized for flexibility andvisibilityCisco OnePKIntegrationOne common set of APs andSDKs in readiness for SoftwareDefined Networking
  36. 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37?Show RunConfigCommon Cisco IOS for LANand WLAN – with the samewell known commands*Cisco VNI Study 2012DebugClearPingSaveCopyAPWireless Management InterfaceWireless Mobility ControllerRenameAntenna dot11One Network in Action – Common Fabric and OSCommon LAN and WLANFabric – Unified AccessData Plane ASIC (UADP)SetProgrammable SDN-Ready
  37. 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38Common Cisco IOS for LANand WLAN – with the samewell known commands*Cisco VNI Study 2012One Network in Action – Common Fabric and OSCommon LAN and WLANFabric – Unified AccessData Plane ASIC (UADP)Programmable SDN-ReadyShowRun SaveSetConfigDebugClearPingCopyAPAntennadot11?
  38. 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39Network-wide VisibilityFaster troubleshooting – with end to endApplication Visibility and ControlConsistent Policyacross LAN and WLANImproved user experience – policy thatfollows the user across the LAN and WLANCommon LAN andWLAN fabric andoperating systemReduce CLI clutter and fatigue, consistentfeatures across LAN and WLANScale and Performancefor 802.11acEliminate bottlenecks – distributed the dataand control plane to the edge for performanceand scaleMaximum ResiliencyNon-stop operation of the LAN and WLAN withStateful SwitchoverBenefits of One Network
  39. 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40Adding Cloud Networking
  40. 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41Extending Unified Access Vision to Mid-MarketWith Cloud-Managed (Meraki) Networking SolutionsCisco Networking PortfolioCisco Enterprise Portfolio Cisco Cloud ManagedCloud Managementand PolicyPrime ISEUnparalleled Deployment FlexibilityCatalyst 2K/3K/4K/6KISR- AX: Routing, Security, WAAS, UCS-EAironet Access Points3rd Party MDM IntegrationCatalyst 3850with integratedcontrollerWLAN ControllersEase of UseMS SwitchMX Series SecurityAppliancesMR AP’sSystems ManagerCloud Controller
  41. 41. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42Designed withspecificcustomers inmindWho is this customer?• Distributed sites• Lean IT staff• Supports rapidly changing IT landscape• Looks for simplicity in management, purchase,deploymentWhat are they dealing with?• 10x more devices with fixed staff• High bandwidth web apps• BYOD• Demand for access everywhere
  42. 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43Meraki MSEthernet SwitchesMeraki SMMobile Device ManagementMeraki MRWireless LANMeraki MXSecurity Appliances
  43. 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44Simple: Cloud License & Meraki HardwareScalable: Unlimited throughput and sitesReliable: 99.99% uptime SLASecure: No user traffic through cloudCurrent: SaaS always up to dateManagementdata (1 kb/s)WANLAN
  44. 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45Scales to million user deploymentsTelmex Infinitum MovilHotspot / 3G offload in Starbucks, McDonalds,Burger King, Chili’s, 7-11, California PizzaKitchen, …Large-scale 10,000+ access point deploymentsAccor North AmericaNationwide deployment covering 100,000 rooms
  45. 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46Adding Business Value
  46. 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47GUEST PRESENCEMobile device and characteristicsdetected before they enter the venueGUEST ACCESSSeamless and secure Wi-Fi connectivityPreferences, profile, device and roamingcredentials identifiedGUEST EXPERIENCEHighly-relevant content and servicesbased on user attributes and real-time locationConnected Mobile ExperiencesHow It WorksDETECT CONNECT ENGAGEADVANCED LOCATION ANALYTICSInsights Into User Online and Onsite Behavior, Traffic Paths, Dwell Times, Location Density Etc.
  47. 47. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48• Context-richnotifications• Encouraged use ofloyalty app• In-venue high valueshopper engagement• Indoor maps withfeatured attractions• Personalized 3rd partyadvertising• Special promotions• Café and gift shoporders and delivery• Maps and way findingintegrated intopatient apps• Nearby servicesnotifications• Campus mapsdirections• Stadium sales athleticevent experience• Real-time bus maps• Better planning for hightraffic areas• Transportationupdates; indoordirections• 3rd party advertisingopportunitiesCONNECTEDCONSUMERSCONNECTEDGUESTSCONNECTEDPATIENTSCONNECTEDSTUDENTSCONNECTEDTRAVELERSRETAIL HOSPITALITY TRANSPORTATION HEALTHCARE EDUCATIONImagine The PossibilitiesIndustry Use Cases
  48. 48. Download Fernbank AppLocal Services50%DOWNLOADCOMPLETE3GJESSICA_Hi, I am Jack.I’ll be your tourguide today.Hear thatRoar?ROARView Note CardYou are now in theGreat Room. See howthe Giganotosauruslived millions ofyears ago!ContinuePlease FollowRoute to findNatureQuestA.B.C.Which animal lived inthe mighty Red Oak?PuzzleCongratulationsJessica! You are now aJunior Paleontologist!Share ResultsHere are somerecommendationsfrom our Gift Shop!Get 10% OFFwith your QR CodeTransforming Visitor Experience with Personalized, Managed Wi-Fi Services• Network ServicesDiscovery onthe Device• Local ServicesDiscovery• Seamless Handofffrom 3G/4G toWi-Fi Using AT&TWISPr Client orHotSpot 2.0• ApplicationDownloaded• PersonalizedApplication• PersonalizedTour Guide• Context-BasedInformation basedon Visitor Location• Turn by Turnnavigationbased on Location• Context-BasedInformation basedon Visitor Location• BusinessIntelligence
• Promotions
• Analytics
• Social Networking
  49. 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50SDN – Open Network Environment
  50. 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51ServicesIOSASICHWServicesIOSASICHWServicesIOSASICHWServicesIOSASICHWServicesIOSASICHWServicesIOSASICHWMany Purpose-BuiltArchitecturesSwitching – Routing – WirelessUniqueServicesIOSVariantsPurposeBuiltASICsCustomHWMultiple Products onCommon ArchitectureCommon ServicesIOS - XEUADP & USCP ASICStandard PlatformsSimple, Secure, Reduced TCOCisco ONE ArchitectureSoftware-DefinedServicesIOS - XEUADP & USCP ASICStandard PlatformsCisco ONEManagement &PolicyAgile Software Model
  51. 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52Thank you.Be sure to follow us on Twitter at #CiscoConnect_TO
  52. 52. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53Thank you.
  53. 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54Cisco ONEArchitectureNETWORKAPPLICATION LAYERCONTROLLAYERNETWORKELEMENTLAYERCiscoISECiscoPrimeCloudServicesSecurityServicesMobilityServicesApplicationServicesNetwork Service FunctionsCisco ONE Controller (Network Services APIs)Discovery Topology …. QoS LocationDevice API – One PK, OpenFlow, CLICisco Network Operating Systems (Enterprise, Data Center, Service Provider)ASICDATA PLANESOFTWAREDATA PLANE

×