Deploy & Manage BYOD and VDI Services

1,746 views

Published on

Learn the concept behind Bring-Your-Own-Device (BYOD) and Virtual Desktop Infrastructure (VDI).

Published in: Technology, Education
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,746
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
0
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Deploy & Manage BYOD and VDI Services

  1. 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1Toronto, CanadaMay 30 2013BYOD andVirtualized DesktopsFollow us on Twitter at #CiscoConnect_TO
  2. 2. qr.net/cc2013
  3. 3. Agendaqr.net/cc2013123What and how to make it possibleCisco’s distinct approach to BYOD and VDIServices approach to BYOD and VDI - Q&A
  4. 4. qr.net/cc2013Question for you…
  5. 5. qr.net/cc2013BYOD?
  6. 6. qr.net/cc2013BYOD?VDI?
  7. 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential1
  8. 8. 700Msmartphones sales in 2012
  9. 9. 100MApple iPads forecasted in 2013
  10. 10. 3MilliWebEx App downloaded on iTunes
  11. 11. 80%Hosted Virtual Desktops in China
  12. 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12Transitioning to a Post-PC WorldNew choices are available at every level of the traditional stack.PC World Post-PC WorldClient OSServerArchitectureApplicationsDevices
  13. 13. Converging Workplaceusers on Hosted Virtual Desktop (HVD) by 2016(Gartner, 2012)77M
  14. 14. Converging Workplaceof Enterprises will support BYOD(Cisco IBSG Horizons study, 2012)90%
  15. 15. Converging Workplaceof IT leaders are implementing or planning to implementUC on VDI terminals(Nemertes, 2012)60%
  16. 16. "Bring your own device" (BYOD) drives innovationfor CIOs and the business by increasing thenumber of mobile application users in theworkforce.
  17. 17. BYOD improves employee satisfaction, resulting ina favorable perception of CIOs and theirorganizations.
  18. 18. CIOs can use BYOD as a cost reduction andavoidance mechanism.
  19. 19. companies expect to stop providing devices to workers by 201638%
  20. 20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20This is not the future, it’s the new normal...
  21. 21. 21© 2011 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialBYOD touches the entire businessLines-of-Business/HRCompliance OperationsSecurity OperationsApplication TeamEndpointTeamNetworkTeamData Center Team
  22. 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
  23. 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting Things
  24. 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting CloudsConnecting Things
  25. 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting PeopleConnecting CloudsConnecting Things
  26. 26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting PeopleConnecting CloudsConnecting ThingsSimpleSecureReduced TCO
  27. 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting PeopleConnecting CloudsConnecting ThingsSimpleSecureReduced TCOONENETWORK
  28. 28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting PeopleConnecting CloudsConnecting ThingsSimpleSecureReduced TCOONENETWORKONEMANAGEMENT
  29. 29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29Cisco Enterprise Network VisionC i s c o O N E E n t e r p r i s e A r c h i t e c t u r eConnecting PeopleConnecting CloudsConnecting ThingsSimpleSecureReduced TCOONENETWORKONEMANAGEMENTONE POLICY
  30. 30. Cisco Collaboration Portfolio
  31. 31. Cisco Collaboration PortfolioUnifiedCommunica-ons
  32. 32. Cisco Collaboration PortfolioUnifiedCommunica-onsTelepresence
  33. 33. Cisco Collaboration PortfolioUnifiedCommunica-onsTelepresenceCollabora-onApplica-ons
  34. 34. Cisco Collaboration PortfolioUnifiedCommunica-onsTelepresenceCollabora-onApplica-onsCustomerCollabora-on
  35. 35. Cisco Collaboration PortfolioCLOUDON PREMISEUnifiedCommunica-onsTelepresenceCollabora-onApplica-onsCustomerCollabora-on
  36. 36. Cisco Collaboration PortfolioCLOUDON PREMISEUnifiedCommunica-onsTelepresenceCollabora-onApplica-onsCustomerCollabora-onCiscoUnifiedCommunicationsManager
  37. 37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco’s Any Device Landscape (April 30, 2013)
  38. 38. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialMobile Devices (BYOD)Other15,987 32,780 11,222 834Cisco’s Any Device Landscape (April 30, 2013)5,401
  39. 39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialMobile Devices (BYOD)Corporate Laptops (CYOD)82,559 31,321*7,365Other15,987 32,780 11,222 834Cisco’s Any Device Landscape (April 30, 2013)5,401
  40. 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialMobile Devices (BYOD)Corporate Laptops (CYOD)82,559 31,321*7,365Corporate VXI Endpoints3,101Other15,987 32,780 11,222 834Cisco’s Any Device Landscape (April 30, 2013)5,401* Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
  41. 41. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential2
  42. 42. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42BYOD – Risks and ChallengesDeliver Applications on Any DeviceSecure information and communicationsInteroperability across devicesEnable Collaboration Beyond Corporate BoundariesDevice Management
  43. 43. Cisco IT BYOD Architecture
  44. 44. Cisco IT BYOD ArchitectureConnectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
  45. 45. Cisco IT BYOD ArchitectureConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
  46. 46. Cisco IT BYOD ArchitectureConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  47. 47. Cisco IT BYOD ArchitectureDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  48. 48. Cisco IT BYOD ArchitectureDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device ManagementLocal Exchange UnstructuredData Cache User ProfileData
  49. 49. Cisco IT BYOD ArchitectureDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device ManagementApp Delivery SoftwareDeliveryCisco ACNSLocal Exchange UnstructuredData Cache User ProfileData
  50. 50. Cisco IT BYOD ArchitectureDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device ManagementApp Delivery SoftwareDeliveryCisco ACNSClientAppsPPTWord Excel Exchange ClearCase Directory BusAppsWebExSocialBlogs Meetings JabberWeb AppsLocal Exchange UnstructuredData Cache User ProfileDataVDI
  51. 51. Cisco IT BYOD ArchitectureDevicesiPhoneTabletsAndroid BlackBerry Virtual Clients Desktop/NotebooksDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device ManagementApp Delivery SoftwareDeliveryCisco ACNSClientAppsPPTWord Excel Exchange ClearCase Directory BusAppsWebExSocialBlogs Meetings JabberWeb AppsLocal Exchange UnstructuredData Cache User ProfileDataVDI
  52. 52. Cisco IT BYOD ArchitectureDevicesiPhoneTabletsAndroid BlackBerry Virtual Clients Desktop/NotebooksDevice Security Encryption Behavior Analysis Anti-Virus BackupConnectivity Service Providers External Wi-Fi Internal Wi-Fi WiredSecure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity ManagementPolicy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device ManagementApp Delivery SoftwareDeliveryCisco ACNSClientAppsPPTWord Excel Exchange ClearCase Directory BusAppsWebExSocialBlogs Meetings JabberWeb AppsPortalsLocal Exchange UnstructuredData Cache User ProfileDataProvisioning&ManagementCiscoEnterpriseStoreVDI
  53. 53. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53Cisco BYODSmart Solution Strategy
  54. 54. BYOD ArchitectureIdentity and PolicyIdentity ProfilingVLAN 10VLAN 20Wireless LANControllerDHCPRADIUSSNMPNetFlowHTTPDNSCisco® ISEUnified AccessManagementIEEE 802.1x EAPUser Authentication1HQ2:38 p.m.Profiling toIdentify Device26Full or Partial AccessGrantedPersonalAssetCompany Asset3Postureof the DevicePolicyDecision45Enforce Policy in theNetworkCorporateResourcesInternet OnlyCisco Prime™ : Central Network ManagementUnified Infrastructure: Wired and Wireless Networks
  55. 55. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55BYOD Validated Solution Components
  56. 56. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialWireless Access for BYODCisco Mobility Technology for High Performance Wireless Network
  57. 57. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57Wireless Access for BYODCisco Mobility Technology for High Performance Wireless NetworkMore reliable RF coverage/thruputBetter signal strength forclientsMore scalable broadcast video Higher performance andcoverage
  58. 58. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58Wireless Access for BYODCisco Mobility Technology for High Performance Wireless NetworkCleanAirImproved PerformanceProactive and automaticinterference mitigationMore reliable RF coverage/thruputBetter signal strength forclientsMore scalable broadcast video Higher performance andcoverage
  59. 59. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59Wireless Access for BYODCisco Mobility Technology for High Performance Wireless NetworkCleanAir ClientLink 2.0Improved PerformanceProactive and automaticinterference mitigationImproved PerformanceProactive and automatic beamforming for 802.11n and legacyclientsMore reliable RF coverage/thruputBetter signal strength forclientsMore scalable broadcast video Higher performance andcoverage
  60. 60. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60Wireless Access for BYODCisco Mobility Technology for High Performance Wireless NetworkCleanAir ClientLink 2.0 VideoStreamImproved PerformanceProactive and automaticinterference mitigationImproved PerformanceProactive and automatic beamforming for 802.11n and legacyclientsImproved PerformanceWired multicast over awireless networkMore reliable RF coverage/thruputBetter signal strength forclientsMore scalable broadcast video Higher performance andcoverage
  61. 61. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61Wireless Access for BYODCisco Mobility Technology for High Performance Wireless NetworkCleanAir ClientLink 2.0 VideoStreamImproved PerformanceProactive and automaticinterference mitigationAP 3600Improved PerformanceProactive and automatic beamforming for 802.11n and legacyclientsImproved PerformanceWired multicast over awireless networkAccess Point InnovationThe Tablet AP, enhancedthroughput and coverage fortablets and smart devicesMore reliable RF coverage/thruputBetter signal strength forclientsMore scalable broadcast video Higher performance andcoverage
  62. 62. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62Integrated Device Profiling and PostureAssessmentProfiling of wired and wireless devices Integrated and built intoISE policyConsistent Policy forDevice CategoriesSystem-wide Visibility with Cisco Prime NCSand ISETroubleshoot and Monitoring ConsolidatedDataGuest Lifecycle ManagementProvide Guest Access in a seamless,secure mannerPolicyEmployeeIdentity Services Engine (ISE)Simplified Role-Based AccessKeep Existing Logical Design ManageSecurityGroup AccessPolicy Public PrivateEmployee Permit PermitContractor Permit DenyConsolidated Contextual InformationReal-Time AwarenessTrack Active Usersand DevicesUSER IDACCESS RIGHTSDEVICE (and IP/MAC)LOCATIONConsolidated ServicesSoftware PackagesISEACSNAC ProfilerNAC GuestNAC ManagerNAC Server
  63. 63. Unified ManagementFind and Solve Problems Quickly
  64. 64. BEFOREMany Windows, Fragmented ViewSiloed Inefficient Operational ModelRepetitive Manual correlation of dataError Prone Consumes time and resourcesWirelessIdentityWiredUnified ManagementFind and Solve Problems Quickly
  65. 65. BEFOREMany Windows, Fragmented ViewAFTERComprehensive Userand Access VisibilityUnifiedManagementWirelessWiredPolicySimple Find and solve user problems fastUnified View of all devices by user, across networksLower Opex More efficient use of IT resourcesSiloed Inefficient Operational ModelRepetitive Manual correlation of dataError Prone Consumes time and resourcesWirelessIdentityWiredUnified ManagementFind and Solve Problems Quickly
  66. 66. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialBringing it All TogetherUnified AccessScalable converged wireless and wired networkIdentity-based access control
  67. 67. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialBringing it All TogetherUnified AccessScalable converged wireless and wired networkIdentity-based access controlSecurity/PolicyData loss and threat preventionContext aware access to data
  68. 68. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialBringing it All TogetherUnified AccessScalable converged wireless and wired networkIdentity-based access controlSecurity/PolicyData loss and threat preventionContext aware access to dataUser ExperienceUncompromised video, voice in any deployment modeConsistent, portable across platforms
  69. 69. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialBringing it All TogetherUnified AccessScalable converged wireless and wired networkIdentity-based access controlSecurity/PolicyData loss and threat preventionContext aware access to dataManagementSingle system for wired / wireless / VPNProvisioning and Mobile Device ManagementUser ExperienceUncompromised video, voice in any deployment modeConsistent, portable across platforms
  70. 70. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70Bringing it All TogetherUnified AccessScalable converged wireless and wired networkIdentity-based access controlSecurity/PolicyData loss and threat preventionContext aware access to dataManagementSingle system for wired / wireless / VPNProvisioning and Mobile Device ManagementUser ExperienceUncompromised video, voice in any deployment modeConsistent, portable across platformsApplicationsNative or virtual application deliveryCollaborative and corporate applications
  71. 71. Cisco Collaboration PortfolioCLOUDON PREMISEUnifiedCommunica-onsTelepresenceCollabora-onApplica-onsCustomerCollabora-on
  72. 72. VideoMobilityConferencingDesktop PC MacOn the deskFull immersion TelePresenceMobile deviceBlackBerry iPhone iPad AndroidPresenceInstant MessagingMobile softphoneInside and outside the firewallOne link to join meetingCall back to join meeting
  73. 73. Cisco Jabber
  74. 74. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74Cisco JabberBest User Experience Across Broadest Range of PlatformsWin, Mac iPad, Tablet Smartphone Web
  75. 75. 75Automatic, seamless presence and call controlintegration with WebEx
  76. 76. 76Automatic, seamless presence and call controlintegration with WebEx
  77. 77. 77Automatic, seamless presence and call controlintegration with WebEx
  78. 78. 78Automatic, seamless presence and call controlintegration with WebEx
  79. 79. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79WebEx and Mobility
  80. 80. 80WebEx & TelePresence IntegrationBrings in-room meeting experiences to remote users with a single touchTelePresence User WebEx UserSingle touchto join meetingand share contentSingle clickto join meetingand view contentand video
  81. 81. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81Cisco WebEx Meetings for BlackBerry 2.0• Schedule, start, join, host meetings• View shared content• View and Chat with attendees• Auto callback; mute/unmute• BlackBerry 10 and earlierFirst conferencing app forBlackBerry 10
  82. 82. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82Cisco WebEx Meetings – Android• Schedule, Start, Join, Host meetings• View and chat with attendees• View shared content• 2-way, high quality, multipoint video• VoIP and video over Wi-Fi, 3G/4G• Training Center mobile access
  83. 83. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83Cisco WebEx Meetings – iPhone and iPad VideoExperience• 2-way, high-quality, multipointvideo• Voice-activated video switching• Full-screen video• Portrait & landscape• View content and videosimultaneously (iPad)
  84. 84. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84Cisco WebEx Meetings – iPad Content Sharing• Share in to meetings from your mobile deviceiWork documents, PDF, Word, Excel, PPTSupported files from a DropboxPhotos from your iPad Camera RollFiles attached to a meeting space (WebEx Meetings)• “How to” tips guide onsharing throughout iPad
  85. 85. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85Cisco BYOD + VirtualizationSession VirtualizationSessionVirtualizationClientApplicationVirtualizationDataCenterNetworkDesktop VirtualizationDesktopVirtualizationClientDesktopVirtualizationDataCenterNetworkWhy Virtualization?Application Portability:Delivering legacy/non-native apps tobroad device setExample: iPad does not support anapplication nativelyData Loss Prevention:Securing Enterprise applications anddataExample: avoid storing data locally, useof virtualization for application subset –confidential, intellectual property,financialPriority Use Cases: Citrix Receiver on Tablets
  86. 86. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86VDI and Real TimeCommunications
  87. 87. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87Cisco VXICisco Virtualization Experience InfrastructureBeyond Desktop Virtualization to Unified WorkspaceDesktopVirtualization• More scalable• More secure• Simplified deployment• Lower cost• Collaboration• Workspace mobility• Network optimization• End-to-end security
  88. 88. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88Collaboration on Any Device with Cisco JabberPresence& IMVoice Video Conferencing MessagingDesktop Mobile Thin Clients
  89. 89. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89New Software Strategy for Virtual Environments• Cisco Virtualization Experience Media Engine(VXME)A new software that enables Jabber to run invirtualized environments• Supported on thin clients and Windows PCsCisco Virtualization Experience Client (VXC) 6215Windows-based 3rd party thin clients and PCs• Enable the same Jabber experience running onvirtual desktop as available today on your PCPresence & IMHigh definition video & wideband audioConferencingCisco VXC 6215Dell Wyse Z50DWindows PCsWindows Thin Clients
  90. 90. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90Delivering a Better Collaboration Experience• Redesigned workspace focused on the userexperience that delivers increased productivity• Customizable workspace to support the workenvironment• Enterprise-grade voice and video quality andexperience based on Cisco UnifiedCommunications
  91. 91. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91Simplifying Desktop Virtualization for IT• Leverages the same converged network forvoice, video, data• Automatically prioritizes voice and videotraffic through network-based QoS andintegration with Cisco MediaNet• Optimizes network and server resources:bandwidth reduction from megabytes tokilobytes• Supported by leading desktop virtualizationpartners, Citrix and VMwareDesktop VirtualizationProtocolCiscoVXMEData CenterUser DesktopMediaFlowCisco UCManagerAcross All DevicesSIPSignaling
  92. 92. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92MedianetDelivering a Consistent Collaboration ExperienceAnywhere, any content, on any deviceEnvironmentsPlatformServicesDelivery ModelExperienceRemoteOffice TravelHome
  93. 93. BYOD and VirtualizationSummary
  94. 94. Take a phased approach to BYOD and evaluate use casesBYOD and VirtualizationSummary
  95. 95. Integrate UC and VDI solutions with collaboration and mobilityTake a phased approach to BYOD and evaluate use casesBYOD and VirtualizationSummary
  96. 96. Integrate UC and VDI solutions with collaboration and mobilityDeliver capabilities to your end users, not point productsTake a phased approach to BYOD and evaluate use casesBYOD and VirtualizationSummary
  97. 97. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential3
  98. 98. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98BYOD and Mobility are the top priorities for most companies
  99. 99. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99BYOD Driving Organizational ChangeDrive NewBusiness Models Increase ProductivityIncrease Agility Attract and Retain TalentSimplify Operations Speed Time to Market Mitigate RisksI Can Use iPadson My NetworkTactical ApproachStrategic ApproachEnd UserBusinessIT
  100. 100. Shifting the Conversation: Whether to HOWApplications Team:• Which applications should I make available on any device?• How do I optimize the performance and delivery ofapplications?Network Engineers:• How do I troubleshoot wireless access problems?• How do I separate device issues from network and policy issues?• How do I ensure user experience?Security Operations:• How do I protect my network and data assets from unauthorizedaccess, malware, DLP, device loss/theft?• How do I implement multiple security policies per user, device,etc.?Compliance Operations:• How do I ensure corporate legal compliance (SOX, HIPAA,PCI, etc.)?Network Operations:• What devices are on my networks?• Which users are using what devices?What apps are being accessed?• What are the real-time appperformance metrics?Business & Technical Framework:• What are Business drivers for BYOD?• How does IT positively impact business goals?
  101. 101. Translating Complex Into ManageableBYODServiceKit
  102. 102. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102• Will navigate through the complexities of yourBYOD requirements• Will create a secure and practical roadmap fordeployment• Will use proven industry relevant best practicesand methodologies• Will provide a full scope of services to supportan accelerated deployment form strategy topre-production deploymentMoving into How—Accelerating DeploymentCisco Architects
  103. 103. Cisco BYOD Service KitAccelerate BYOD deployment – from strategy to pre-productionGather business and ITimperativesCreate High Level future statearchitecture and use casesDevelop Strategy andRoadmap documentAssess current state environment(LAN, WLAN, Security)Develop recommendations based onCisco best practicesCreate BYOD Architecture AssessmentreportDevelop BYOD solution design withpotential risks identifiedLAN, WLAN, ISE, CPI integration designguidance and recommendationCreate BYOD ArchitectureDesign documentDeploy solution in pre-production environmentValidate use cases in scopeAs-built solution knowledgetransferBYODServiceKit
  104. 104. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialObjectiveActivities DeliverablesStrategy and RoadmapAlign the network architecture BYOD strategy with business goals and integratingrequirements that address security, compliance risks, user experience,interoperability and integration• High-level evaluation, capture the CustomersBYOD business imperatives, technologyrequirements, use cases and implications• Capture the current state of the network,including key capabilities, governance/compliance and business drivers• Review current infrastructure, security, WLAN& management requirements against CiscoBest Practices• BYOD Strategy and Roadmap Document• BYOD Customer Requirements Document
  105. 105. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialObjectiveActivities DeliverablesFoundational AssessmentEvaluate the current network against identified requirements to providerecommendations for adoption of future state BYOD architecture• Assess technical controls and architecture ofexisting access network, wireless and securityinfrastructure vis-a-vis BYOD• Assess the current security and riskmanagement programs and its ability tosupport the future state requirements• Identify strengths, weaknesses, gaps andrecommendations against Cisco best practiceBYOD solution• BYOD Architecture Assessment Report,including KPIs, metric dashboard• Recommendations for adoption of futurestate BYOD architecture• Updated Customer RequirementsDocument,if applicable
  106. 106. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialObjectiveActivities DeliverablesFoundational DesignDevelop a BYOD architecture design for up to 3 use cases, mapping businessobjectives to technical requirements for use in pre-production deployment.• Define design recommendation, includingproposed network topology, resiliency,availability, scalability, interoperability• Guidance on WLAN & ISE integration,including impact to LAN infrastructure• Identify and document key risks in theproposed design• BYOD Architecture Design Document• Configuration for WLAN controller, CiscoPrime (WLAN), access point & ISE
  107. 107. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialObjectiveActivities DeliverablesPre-Production DeploymentValidate the Cisco BYOD solution design for up to 3 use cases through a pre-production deployment• Provide WLAN, Cisco Prime (WLAN), ISE &AP configuration according to BYOD Design• Develop BYOD solution test cases,procedures and success criteria• Conduct as-built BYOD solution knowledgetransfer• BYOD solution configuration (WLAN, ISE,Cisco Prime (WLAN), AP)• Validate BYOD solution and use case testresults against success criteria• Conduct as-built BYOD solution knowledgetransfer
  108. 108. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108Please Complete YourSession Evaluation!

×