• Save
The Path to BYOD in Financial Enterprise
Upcoming SlideShare
Loading in...5
×
 

The Path to BYOD in Financial Enterprise

on

  • 255 views

Aruba EMEA Partner conference slideshare v1.0

Aruba EMEA Partner conference slideshare v1.0

Statistics

Views

Total Views
255
Views on SlideShare
255
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

The Path to BYOD in Financial Enterprise The Path to BYOD in Financial Enterprise Presentation Transcript

  • © 2013 Beyond Mobile Ltd June 6, 2013ARUBA 2013 PARTNER CONFERENCE
  • © 2013 Beyond Mobile Ltd June 6, 2013INTRODUCTION2An  IT  infrastructure  specialist  with  over  20  years  in  the  financial  services  sector.      11  years  with  Credit  Suisse  and  6  with  Chase  (JP  Morgan)    Tough  environment  in  Financial  services  and  deparGng  a  role  as  Director  in  IT  for  Credit  Suisse  to  start  Beyond  Mobile.    Beyond  Mobile  offers  Strategy,  Product  and  Sales  advice  to  companies  who  want  to  sell  into  enterprise  and/or  develop  products  for  this  sector.  
  • © 2013 Beyond Mobile Ltd June 6, 2013 3WHAT IS AN ENTERPRISE
  • © 2013 Beyond Mobile Ltd June 6, 2013 4ALL THE SAME RIGHT !
  • © 2013 Beyond Mobile Ltd June 6, 2013DeclaraGon   NX   Sovereign  circa  2130s   April  16,  2151   October  30,  2372  52,000  metric  tonnes   998,000  metric  tonnes   3,250,000  metric  tonnes  300  metres   225  metres   685.7  metres        <  Warp  2   Warp  5.2   Warp  9.995  None   Photonic  torpedoes  Phase  cannons  Arrays  Phasers  USS  Enterprise    (XCV  330)  NX01   NCC-­‐1701-­‐E  5COMPARISON STAR TREK ENTERPRISE
  • © 2013 Beyond Mobile Ltd June 6, 2013Enterprise  1  (Financial)    Case  Study  (Financial)  Enterprise  3  (consulGng)  COMPARISON OF AN ENTERPRISE6120,000   65,000   20,000  143,000   80,000   2,000  28,000   15,000   20,000  170,000   120,000   2,500  Yes   Yes   No  “dirty  network”  “clean  network”   “clean  network”  
  • © 2013 Beyond Mobile Ltd June 6, 2013EVIL INTERNET & WIRELESS7Wi-Fi BANNEDCustom laptops with Wi-Fi cardsremovedEthernet ports and drivers lockeddownRemote access restricted to dial upAlmost impossible to be productiveunless in the office  
  • © 2013 Beyond Mobile Ltd June 6, 2013EVOLUTION NOT REVOLUTION8
  • © 2013 Beyond Mobile Ltd June 6, 2013NETWORK STRATEGY9DEPERIMITISATION  PROTECT  THE  DATA  
  • © 2013 Beyond Mobile Ltd June 6, 20132007 – 1ST GEN WI-FI10CISO concedes some Wi-Fi allowed“Managed” endpoints onlyGuest internet access allowedNo employee personal devices allowedUser experience not consideredWi-Fi Design poorGlobal inconsistency  
  • © 2013 Beyond Mobile Ltd June 6, 20132009 CHALLENGERS11“Why can’t I use the corporateWi-Fi to sync my work email”“Cellular coverage is so bad in mybuilding and it’s crazy employee’scant use the Corporate Wi-Fi ontheir personal devices”Crumbling of IT Walled gardens
  • © 2013 Beyond Mobile Ltd June 6, 20132011 THE GAME CHANGED12Real estate smart strategiesWi-Fi shifted to a core “enabling” technologyand business enabler.BYOD strategy was built demanding betterservicesCIO – build it quick but I wouldn’t start fromthere, if I was you
  • © 2013 Beyond Mobile Ltd June 6, 2013THE BEGINNING OR THE END?13RequirementsStakeholder ManagementBuy as a Service vs BuildService RequirementsLesson’s learnt
  • © 2013 Beyond Mobile Ltd June 6, 2013REQUIREMENTS14Guest Standard Employee Complex EmployeePerformance   Medium   Medium   High  Personal  or  Corp   Personal   Mixed   Corporate  BYOD   Yes   Yes   Yes    &  Corporate  Security   None   MAM   MDM  &  MAM  Filtered   No   Yes   Yes  
  • © 2013 Beyond Mobile Ltd June 6, 2013STAKEHOLDER MANAGEMENT15Clean  vs.  dirty  wireless  =  same  On  campus  =  enterprise  policed  Keep  out  of  trouble  with    the  regulator  Employee  traffic  content  filtered  Info  Sec,  HR/Legal  
  • © 2013 Beyond Mobile Ltd June 6, 2013STAKEHOLDER MANAGEMENT16Apply  IT  policy  Same  quality  as  LAN  Wi-­‐Fi  as  a  commodity  Protect  data  vs.  network  BYOD  Don’t  compromise  usability  for  security  Container  (s)  vs    MAM  
  • © 2013 Beyond Mobile Ltd June 6, 2013BUY VS BUILDCorporate  IT  in  Financial  Services  idenGty  crisis  Buy  as  a  service  a  preference  RFP  processes  Market  not  Mature,    surely  an  opportunity  for  partners  One  Vendor  stood  out  in  access  control  and  provisioning  =  One  partner  stood  out  in  experience  &  engagement  =  Aruba  Vanix  
  • © 2013 Beyond Mobile Ltd June 6, 2013Wi-­‐Fi  1st  Gen     Wi-­‐Fi  2nd  Gen   Wi-­‐Fi  FUTURE  SERVICE REQUIREMENTS18802.11a/b/g   802.11  n  to  ac   802.11ac  Data   Data  /  Voice   Data  /  Voice  /  Video  Manual   Online  registraGon  &  Sponsor  approval  Federated  B2B  Build   Build  &  Buy   Buy  None   non-­‐criGcal  service  severity  4  SLA    Clearpass  CPPM  6.x   Aruba  end  to  end  ParGally  supported                  Cisco  BBSM  4.x  CriGcal  service    LAN  replacement  
  • © 2013 Beyond Mobile Ltd June 6, 2013LESSONS LEARNTTesGng  •  BYOD  footprint  for  tesGng  can  be  never  ending  •  Amount  &  complexity  of  devices  leads  to  issues  with  tools  for  troubleshooGng    Support    •  Specialists  too  thin  on  ground    •  Mobility  support  is  a  specialist  skillset  •  OpportuniGes  for  companies  &  partners    •  Certainty  to  support  costs    Process  engineering  important    CreditSuisseEmployeeArubaClearpassCloudServiceAccessPointIntranetControllerDMZControllerBYODSSIDGuest&ProvisioningSSIDInternetBluecoatDMZProxy125789610CSBYODDeviceCSDesktop43
  • © 2013 Beyond Mobile Ltd June 6, 2013YOUR PATH TO BYOD IN FINANCIALS20ObjecGves  •   Have  clear  business  objecGves  &  Conduct  senior  stakeholders  briefings.  •   Mature  requirements  &  early  engagement  necessary  with  IT  suppliers  •   What  are  your  security  policy  objecGves  • Think  about  process  &  support  design  as  well  as  the  technology  • Translate  the  risk  posture  to  security  controls    • Don’t  compromise  usability  for  security  (impact  of  security  discussions)  • Select  technology  planorms  and  suppliers  • Build  in  compliance  from  the  beginning  • Test,  Test  and  test  some  more  And finally …. Celebrate a success !Design  Partner    Execute  • Will  the  enterprise  buy  “as  a  service”  • Are  there  opportuniGes  to  create  Managed  services  (hosted  or  mobility  support)  • Shioing  CIO’s  cost  from  fixed  -­‐>  Mobile  (not  cost  increases!)    
  • © 2013 Beyond Mobile Ltd June 6, 2013