• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
BYOD for Cisco ASA
 

BYOD for Cisco ASA

on

  • 234 views

How to leverage your existing Cisco ASA infrastructure for BYOD in your company.

How to leverage your existing Cisco ASA infrastructure for BYOD in your company.

Statistics

Views

Total Views
234
Views on SlideShare
234
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    BYOD for Cisco ASA BYOD for Cisco ASA Presentation Transcript

    • Photo  by  Fr3d.org  -­‐  Crea2ve  Commons  A8ribu2on-­‐NonCommercial-­‐ShareAlike  License    h8p://www.flickr.com/photos/89455291@N00   Created  with  Haiku  Deck  
    • BYOD Success Kit Table of Contents •  The Mobile What –  Why BYOD? –  Searching for the Mobile How •  Workspot = The Mobile How –  Integrated Business Workflows on Mobile –  Leverage and Extend Existing Infrastructure •  Conclusion –  Solution Comparison 2"
    • BYOD Success Kit IT cannot ignore BYOD •  Corporate employees have access to 2 Billion devices – phones, tablets, PCs •  There are already more tablets & smartphones than PCs •  The majority of devices are personal and unmanaged (BYOD) 3"
    • BYOD Success Kit We all know mobile will make us more productive Sales Rep can deliver a presentation with an iPad Field Service can access service orders in real time Executive can approve POs from the road Contractors can access SharePoint on their devices 4"
    • BYOD Success Kit And Yet, 16 Years Later We Are Still Doing Email 1997 2007 5" 2013
    • Mobile What: Mobile Enterprise Requirements Security User Experience Apps & Data BYOD; iOS; Android; Windows 8 Discoverability, Auditability, Adaptive Auth Single Sign-On, VPN, RSA Custom/Packaged Web, Windows & Native Network File Shares & SharePoint Device & Email Manage Devices; Secure Email
    • BYOD Success Kit Current Solutions – MDM/MAM Mobile Device Management (MDM) is heavy handed •  End Users Own Devices •  IT cannot lock down and impact their experience for personal applications •  Device Management does not solve the issues of integrated business workflows Mobile Application Management (MAM) is similar to App-V and Citrix Streaming. Remember those? •  Application Compatibility Issues: Will the application continue to work after wrapping? •  Application Support Issues: Who is responsible for supporting the application – the MAM vendor, application vendor, or the OS vendor? •  Will it be Cross-platform – will the wrapping technology work across Android, iOS, and Windows?
    • Mobility Architecture that leverages Cisco Investment
    • BYOD Success Kit Workspot Plugs into Your Existing Infrastructure Have you deployed VPN for remote access? •  If you have deployed VPN today, you don’t need more new infrastructure in your data center. •  Your remote users already use VPN to access corporate assets from home or on the road. The VPN appliance has been integrated with your corporate authentication mechanism – AD & RSA. You have also integrated the VPN appliance with a SSO mechanism like CA Siteminder. •  Workspot can leverage your existing VPN infrastructures – Cisco, Juniper, SonicWall, and F5. 9"
    • BYOD Success Kit Workspot Architecture 100% Cloud Control Plane •  Multi-tenant •  One Version of Code •  Customers are always on latest version •  Speed of Innovation – Customers get new features multiple times a quarter •  Workspot is in the control plane; Separate from data plane •  No data flows through our cloud •  No credentials in the cloud •  No impact on availability if Workspot Control is not available •  Best performance 10"
    • BYOD Success Kit Workspot Collects Granular Context §  Business Benefits: Discoverability, Compliance, and Auditing §  Can be integrated with existing SIEM systems, e.g., Splunk 11"
    • BYOD Success Kit Solution Comparison Category Features Device Management Workspot Email, Wireless, Passcode AirWatch XenMobile Good MobileIron ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ Control Camera, etc. 100% Cloud for Device Management ✔ ✔ ✔ Offline Documents ✔ ✔ 100% Cloud for Data Delivery ✔ Network, Device, Apps ✔ Risk Management – Discoverability, Audit, Adaptive Auth ✔ 100% Cloud for Risk Management ✔ Real Endpoint User Experience ✔ Application Performance Monitoring/Management, Network, Geo ✔ 100% Cloud for Performance and Uptime Visibility End Point Visibility ✔ Network File Shares, SharePoint, Video behind firewall Security Web, Windows, Native 100% Cloud for Application Delivery Data ✔ SSO – Kerberos, NTLM, CA Siteminder, Oracle iDP, SAML App Delivery ✔ ✔ Proprietary and Confidential" 12" ✔ ✔ ✔ ✔ ✔ ✔
    • Perform Workflows in Seconds with the Workspot Client •  Workspot client has a built-in universal VPN connection to Cisco, Juniper, F5, and SonicWall •  Touch SharePoint icon to Access (VPN connection and authentication done in the background) •  Workspot has built-in Single Sign On for NTLM/Kerberos/CA Siteminder/ Oracle iDP/SAML 2.0 •  Workspot has an integrated RSA token generator, certified by RSA 13"
    • BYOD Success Kit Learn More About Workspot Email us at sales@workspot.com 14"