Your SlideShare is downloading. ×
0
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Is your network ready for the BYOD?
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Is your network ready for the BYOD?

1,292

Published on

Is your wired/wireless network ready for the onslaught of BYOD?

Is your wired/wireless network ready for the onslaught of BYOD?

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,292
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
101
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Worker productivity continues to be key focus of the mid-market. Continuing economic concerns are forcing businesses to persist in finding ways to do more with less and they are embracing mobility as a way to achieve that goal. Mobility is allowing employees to work more effectively inside and outside of the office. Mid-size businesses are arming employees with smartphones, laptops, touchpads, as well as dealing with a trend of employees using their own personal devices for work-related activities.They are finding new ways of staying in touch with and servicing customers such as video collaboration and social media.They are exploring technology approaches such as cloud computing that can help them streamline their business, cut costs and increase productivity.
  • In 2011, roughly twice as many smart mobile devices as laptops were shipped, IT has been faced to revaluate how to support this growing array of mobile devices in the enterprise. – GartnerThe question is no longer if IT accepts these “smart mobile” devices on the enterprise network but “how” it supports them, and how it manages and secruirs them. Consumerizationremiains a grassroots phenomenon, driven by business units demanding that users be allowed to bring their personal mobile devices to the office. Isolating these end points on a separate network helps to maintain dta protection policies and network stability in the production environement.
  • First wave — At the peak of the worm era (Sasser in 2003; Blaster in 2004), NAC policies werefocused on blocking risky laptops from accessing the network. In the early days of NAC, acommon goal was to establish a policy dictating that endpoints must have up-to-date patchesand antivirus signatures, and must be protected by a personal firewall, to gain access to thenetwork. Common obstacles to NAC during this era included complexity, costs and operationalconcerns about blocking employees from accessing the network.■ Second wave — In addition to the obstacles outlined above, the threat landscape waschanging. Stealthy, financially motivated attacks replaced noisy, mass worm attacks as theprimary threat. Enterprises also improved their endpoint patching and configurationmanagement processes. NAC shifted to simpler authentication-based policies. "Are You One ofGartner, Inc. | G00219087 Page 3 of 10Us" became the primary focus, as enterprises sought to limit access to corporate-owned andmanaged devices. Endpoints that failed authentication were restricted to a guest network,where they were limited to Internet access only.■ Third wave — In response to the consumerization trend, enterprises are turning to NAC toenforce policies related to BYOD programs. For example, some employee-owned devices maybe allowed, whereas others will be blocked (see the Expected Future State section).Rather than implement a full-blown NAC solution, most organizations have taken a shortcutapproach and established wireless guest networks in common areas, such as visitors' centers andconference rooms. This tactic has largely been effective in keeping guests off the corporatenetwork, but mostly by only providing Internet access to guests via Wi-Fi. In many cases, someguest access to the corporate wired network is required. Enterprises that need to protect the wirednetwork need stronger controls.The use cases that drove adoption in the first wave (endpoint baselining) and the second wave(guest networking) of NAC, and the remote access use case, will still be widely implemented (see"Network Access Control in 2009 and Beyond"). However, these scenarios will often beimplemented after the limited access network has been established (see the Road Map section).Gartner expects that, by 2016, 60% of large enterprises will implement limited access networkzones to limit the connectivity of personally owned mobile devices.
  • The Contain strategy will be relevant for most mainstream organizations. As noted in the followingsections, the Block strategy is too draconian, and the Embrace strategy represents a huge culturalshift that adds technical and operational complexity. A Contain strategy will satisfy the needs ofmost organizations and give them the time to architect effective plans to migrate to an Embracestrategy. A Disregard strategy equates to ignoring the presence of personally owned devices in acorporate environment. This is a poor choice, and organizations that adopt a Disregard strategydon't make any policy or technology changes. In the sections below, we focus on how networkmanagers can use NAC to adopt Contain, Embrace and Block strategies.
  • HP provides a comprehensive BYOD solution that includes:Secure user authentication AND advanced device profilingEnable seamless policy enforcement based on user and/or deviceCustomizable analysis and reporting of BYOD traffic
  • You understand our vision for virtual application networks. Well, this is how it all comes together. We start with the blueprint FlexNetwork architecture, with the solutions for the data center FlexFabric, FlexCampus and FlexBranch to connect the users. We are going to virtualize that entire infrastructure symbolized by these three blue ribbons that come into the center discs. And here, once we virtualize the network, we can use tools built on top of IMC to characterize applications using preconfigured templates. So that we can take advantage of virtualized, end-to-end network infrastructure to deliver applications from a cloud data center to a user in a way where the network is tuned to the delivery requirements of that class of applications whether it is video in multiple forms, conferencing, playback, training, or communications like Lync, real time business applications or messaging applications. You can have hundreds of applications falling into several classes requiring maybe 12 different virtual application networks. Most importantly, as these applications move from the private cloud into the public cloud, the policy for virtual application network can follow it as the users move and we will follow them as well providing for a dynamic environment, one where the applications are deployed rapidly. You can have speed without compromise and it is built on open standards, providing the choice, the flexibility as well as the confidence to have a proven path to the cloud.
  • Transcript

    • 1. Is your wired/wireless networkready for the onslaught of BYOD?Michael ZhuDirector, Global Product Line ManagementMay 2012
    • 2. Mobility, Video Transforming Business Communications At least More than Up to 50 Billion Devices will connect to 25% Of all daily business 10X Increase in network capacity wireless networks by the year communications will be video required to support new wave 2020 or multi-media of business video applications communications by 2013 UNIFIED WIRED AND COLLABORATION, TRAININ INCREASE IN WIRELESS CAMPUS G, AND PRODUCTIVITY BANDWIDTH NETWORKS, AND IT REQUIREMENTS CONSUMERIZATION2 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 3. Grassroots BYOD phenomenon is skyrocketing Enterprise are only aware of 80% of the devices on their network. Those 20% of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. - Gartner 34% of CIOs think employees are accessing their network with personal devices and 69% of users say they are accessing corporate network with personal devices. - IDC3 3 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 4. BYOD Riding on IT Consumerization Megatrend Source: Gartner4 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 5. Top Three Most Wanted in BYOD Solutions SANS Mobility Survey of 500 IT professionals Centralized Functionality Logging Monitoring and Reporting Ease of Deployment5 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 6. BYOD Solution Needs to Accommodate Different Implementation Strategies High Embrace: Allow Employee to use all devices to access all resourcesValue to Business Contain: Allow some people to use some devices to access some resources Low Low High Security “Pressure”Source: Gartner (December 2011) 6 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 7. Main Building Blocks of BYOD SolutionIs your wired and wireless network ready? Identity-Aware Access Unified Network Support Application Monitor and Control • User credential AND device • Seamless wired and wireless policy • Device level application visibility based identity and reporting • Increased wireless client density • Simple and secure on boarding support • Ability to push/block/remove process applications • Higher wired aggregation • AAA support for compliance bandwidth • Enhanced security for sensitive applications BYOD Solution need to be easy to deploy with centralized management and visibility7 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 8. HP FlexNetwork for BYODThe only converged networking architecture that spans from the virtualized data centerto the workplace for cloud, multimedia, and mobility (BYOD) with integrated security HP TippingPoint provides real-time quarantine to keep troublesome BYOD nodes off the network. HP FlexManagement powers the identity-aware access HP FlexFabric, FlexCampus, Flex Branch enable the and control with unified wired and wireless construction of flat, low-latency data center and campus management networks with fewer layers, less equipment and cabling, and greater client densities8 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 9. HP BYOD Solution ArchitectureOne Network, One Policy, One Tool User User User Network Authentication Authorization Access Audit Network Device Agnostic Agnostic Employee Guest Location Time Aware Aware User Security Traffic User User Check Monitoring Behavior Self-service9 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 10. HP BYOD SolutionSimple, Device-Agnostic Access and Control On-boarding Provisioning Monitoring User registration Policy enforcement Traffic and User Device profiling based on level of trust Behavior Analysis10 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 11. HP BYOD SolutionCombined Infrastructure and Access Management for BYOD, Wired and Wireless • Combines access control modules with network management capabilities • Provides a single outlet for setting security policies and viewing user behavior • Can be transparent, with features to monitor or inform without taking enforcement measures • Provides value-add modules for setting and enforcing endpoint security • Tailor solutions with value-add modules11 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 12. HP BYOD SolutionBYOD Ready Wired and Wireless Infrastructure Next Generation Core for Campus „ Leading CLOS architecture „ Greater than 11 terabit-per-second capacity „ Full Layer 3 features and IPv6/MPLS functionality „ HP IRF for simpler, flatter, more agile networks „ Ultra-high 10GbE/Gigabit density; 40/100GbE ready Leading Wireless Solution „ Deliver near gigabit-speed connect rates to Wi-Fi client „ Offer superior range, density and coverage „ Industry First three-spatial stream 802.11n dual-radio AP „ CRN 2011 Tech-Innovation Award winner12 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 13. HP BYOD SolutionMonitor and Control Application Access BYOD user behavior analysis Application specific access monitoring and control Enhanced network optimization and grooming BYOD Live traffic quarantine and keep the network “clean”13 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 14. BYOD and Join HP Virtualized Application Network14 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 15. Bring Your Own Device and See for YourselfHP Mobility Demo Booth15 © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
    • 16. Thank you© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

    ×