Successfully reported this slideshow.

3 Steps to Safely Bringing Your Own Devices (BYOD)

1,531 views

Published on

Exploring enterprise mobility challenges and opportunities as more and more mobile workers start using personal devices in the workplace.

Published in: Technology
  • Be the first to comment

3 Steps to Safely Bringing Your Own Devices (BYOD)

  1. 1. 3 Steps to Safe <br />Bring Your Own Devices (BYOD)<br />September 28, 2011<br />Host and Moderator: <br />David Krebs, VDC Research<br />Sponsors;<br />
  2. 2. <ul><li>Welcome
  3. 3. Panelist Introductions
  4. 4. BYOD market trends
  5. 5. Motorola Solutions
  6. 6. Cloudpath Networks
  7. 7. Bradford Networks
  8. 8. Question and Answers
  9. 9. Wrap up
  10. 10. Motorola XOOM and Apple iPad2 giveaway</li></ul>Must be present to win!<br />Agenda<br />
  11. 11. How many users are on your network?<br />
  12. 12. How many different device types and OS do you expect to support?<br />
  13. 13. How important is it to distinguish between corporate-owned and employee-owned devices?<br />
  14. 14. What are your concerns about supporting BYOD?<br />
  15. 15. <ul><li>The population of mobile workers is rapidly increasing and has reached over 1 billion workers in 2011.
  16. 16. Mobile workers demanding access to critical (corporate) information to enable real time distributed decision making and transaction processing.
  17. 17. Consumerization driving shift in balance of power from corporate IT to the employee/consumer.
  18. 18. Consequence is influx of personal devices and multiple OS platforms infiltrating enterprise environments.
  19. 19. Large amounts of sensitive corporate data is and will be accessed on these mobile devices.
  20. 20. With growing corporate support of personal devices critical to ensure key enterprise management and support policies that span the device lifecycle. </li></ul>BYOD : Key Takeaways<br />
  21. 21. Enterprise Mobility Challenges and Opportunities<br />Benefits &<br /> Business Drivers<br />Empower employees to be more productive <br />Improved customer service<br />Fast, reliable wireless communications<br />Improved decision making capabilities<br />Mobilization of business processes and line of business applications<br />Multiple platform support<br />Security and device management concerns<br />BYOD<br />Application and platform fragmentation<br />Lifecycle management<br />Applications deployment and management<br />Challenges<br />PRIORITY RANKING<br />
  22. 22. Over 50% of organizations provide some level of support for personal/individual devices<br />Enterprises Introducing BYOD Policies<br />Source: 2011 VDC Research survey of 864 mobile decision makers<br />
  23. 23. Mobile & Wireless Solution Requirements Will Differ by Worker Type<br />Mobile <br />Worker<br />Preferred <br />Device<br />Target <br />Applications<br />Technical <br />Requirements<br />Mobile Worker Population<br /><ul><li>Wireless Email
  24. 24. Dashboards
  25. 25. BI/CI
  26. 26. Mobile CRM
  27. 27. Approvals
  28. 28. Expense Reporting
  29. 29. Workflow Management
  30. 30. Mobile browser
  31. 31. 4G+ GPS
  32. 32. Push email
  33. 33. Image capture
  34. 34. Device Management
  35. 35. 3rd-Party Apps
  36. 36. Security support</li></ul>Road Warriors & Executives (Knowledge Workers)<br />28.2M<br /><ul><li>Wireless Email
  37. 37. Time & Attendance
  38. 38. Approvals
  39. 39. Workflow Management
  40. 40. Push Email
  41. 41. Active Sync
  42. 42. Application Partitioning
  43. 43. WiFi </li></ul>Mobile Office Professional (Corridor Warrior)<br />111.6M<br /><ul><li>DECT Functionality
  44. 44. WiFi
  45. 45. 3rd-Party Apps
  46. 46. Image Capture
  47. 47. Wireless Email
  48. 48. Time & Attendance
  49. 49. Approvals
  50. 50. Workflow Management </li></ul>Campus Mobile Worker<br />370.5M<br /><ul><li>Mobile Browser
  51. 51. 3G+ GPS (4G emerging)
  52. 52. Image Capture
  53. 53. Device Management
  54. 54. 3rd-Party Apps
  55. 55. Durability/Ruggedness
  56. 56. Time & Attendance
  57. 57. Dispatching
  58. 58. Workflow Management
  59. 59. Vertical Applications </li></ul>Field Mobile Worker (Task/Line Worker)<br />196.6M<br />
  60. 60. Organizations Are Moving Beyond Email to Enterprise Applications<br />Source: 2011 VDC Research survey of 864 mobile decision makers<br />
  61. 61. From on-boarding and policy management to end of life <br />Device and Application Management Critical to BYOD Success<br />OUT OF BOX EXPERIENCE<br />EFFICIENT APP DEPLOYMENT<br /><ul><li>OTA device provisioning
  62. 62. Software configuration
  63. 63. OTA push of applications and updates
  64. 64. Seamless version control</li></ul>Deployment Complexity<br />Application Management<br />Customer Issues<br /><ul><li>Device diagnostics
  65. 65. OTA fixes
  66. 66. Validate settings
  67. 67. Security
  68. 68. Remote lock and wipe</li></ul>Remote Management<br />Security Management<br />LOWER TCO<br />DATA SECURITY<br />
  69. 69. B.Y.O.D<br />Bring Your Own Device<br />Considerations & Solution Components<br />Tajinder (TJ) Maan<br />Director <br />Enterprise Networking & Communications (ENC)<br />Motorola Solutions<br />Sept 28th, 2011<br />
  70. 70. WiFi Network Considerations<br />Existing Infrastructure: Corporate SSID + Guest SSID<br />BYOD – Secure Separate SSID / Corporate SSID?<br />WLAN Design<br />What Personal Computing devices today & in future?<br />802.1x – PEAP / TLS <br />Pre Shared Key<br />IT Strategy<br />Authentication<br />Access<br />Control<br />Device<br />On-boarding<br />Role Based Firewall<br />Access Control Policies<br />Captive Portal or Email<br />Auto device configuration <br />
  71. 71. Compliance<br />On-Boarding<br />Infrastructure<br />CONTROLLERS & ACCESS POINTS<br />MSP AGENT<br />WiNG5 ROLE BASED FIREWALL &<br />INTEGRATED WIPS<br />SmartRF<br />AirTime Fairness<br />Smart Band Control<br />Smart Load Balance<br />PERFORMANCE & CAPACITY CONTROLS<br />Hotspot Web Pages<br />Built in Radius<br />External LDAP<br />MOBILITY SERVICES PLATFORM<br />CAPTIVE PORTAL<br />Express BYOD Solution<br />Motorola WiNG5<br />Motorola MSP<br />Motorola WiNG 5<br />
  72. 72. Advanced BYOD Solution<br />Compliance<br />On-Boarding<br />Infrastructure<br />Hotspot Web Pages<br />Built in Radius<br />External LDAP<br />WiNG 5<br />CAPTIVE PORTAL<br />CONTROLLERS & ACCESS POINTS<br />WiNG5 ROLE BASED FIREWALL &<br />INTEGRATED WIPS<br />SmartRF<br />AirTime Fairness<br />Smart Band Control<br />Smart Load Balance<br />PERFORMANCE & CAPACITY CONTROLS<br />XpressConnect <br />ON-BOARDING<br />NEXT GENERATION<br />NAC<br />Cloudpath<br />Bradford<br />Motorola<br />
  73. 73. Colorado.edu<br />Kevin Koster<br />Founder, Technical Lead<br />Cloudpath Networks<br />
  74. 74. Keys to On-Boarding<br />Provide Simple Connectivity<br />Self-Service & Intuitive<br />Multiple Platforms<br />Scalable & Sustainable<br />Without Compromising Security<br />Protect Users<br />Protect The Network<br />
  75. 75. SSID Selection<br />Open<br />WPA2-Enterprise<br />Security Considerations<br />Captive Portal<br />Integrated<br />User/Device Authentication<br />No.<br />Integrated<br />Over-The-Air Encryption<br />Network Authentication<br />Integrated<br />No.<br />No.<br />Integrated<br />Standards-Based Policy<br />Usability Considerations<br />Ease Of Initial Access<br />Click to Join.<br />Requires configuration<br />Ease of Ongoing Access<br />Captive Portal Fatigue<br />Automatic Reauthentication<br />
  76. 76. SSID Selection<br />Open<br />WPA2-Enterprise<br />Security Considerations<br />Captive Portal<br />Integrated<br />User/Device Authentication<br />No.<br />Integrated<br />Over-The-Air Encryption<br />Network Authentication<br />Integrated<br />No.<br />No.<br />Integrated<br />Standards-Based Policy<br />Usability Considerations<br />Ease Of Initial Access<br />Click to Join.<br />Requires configuration<br />Ease of Ongoing Access<br />Automatic Reauthentication<br />Captive Portal Fatigue<br />
  77. 77. SSID Selection<br />Open<br />WPA2-Enterprise<br />Security Considerations<br />Captive Portal<br />Integrated<br />User/Device Authentication<br />No.<br />Integrated<br />Over-The-Air Encryption<br />Network Authentication<br />Integrated<br />No.<br />No.<br />Integrated<br />Standards-Based Policy<br />Usability Considerations<br />Ease Of Initial Access<br />Click to Join.<br />Requires configuration<br />Ease of Ongoing Access<br />Captive Portal Fatigue<br />Automatic Reauthentication<br />
  78. 78. XpressConnect On-Boarding<br />New user connects to open (guest) SSID.<br />Captive portal provides link for secure network.<br />XpressConnect configures and moves user.<br />
  79. 79. XpressConnect Capabilities<br />Credentials (PEAP) or Certs (TLS)<br />Install Client Certs & Trusted CAs<br />Interact with Microsoft CA & Others<br />WPA2-Enterprise & PSK<br />Differentiate IT-Issued vs. BYOD<br />Android, Apple iPad, iPhone, iPod<br />Millions of Users Worldwide<br />Windows, Mac OS X, Linux<br />
  80. 80. Keys to On-Boarding<br />Provide Simple Connectivity<br />Self-Service & Intuitive<br />Multiple Platforms<br />Scalable & Sustainable<br />Without Compromising Security<br />Protect Users<br />WPA2-Enterprise<br />Protect The Network<br />
  81. 81. Bring Your Own Device (BYOD)<br />Frank Andrus<br />CTO<br />
  82. 82. 25<br />BYOD and Your Business<br />Heterogeneous<br />APPLICATIONS<br />COMMUNICATIONS<br />DEVICES<br />Homogeneous<br />
  83. 83. 26<br />BYOD and Your Business<br />ACCESS<br />SECURITY<br />Striking a Balance<br /><ul><li> Security vs. Accessibility
  84. 84. Enabling the business while protecting it</li></ul>Visibility is Crucial<br /><ul><li> Knowledge of who, what, where, when, how …
  85. 85. Network-wide, right out to point of access</li></li></ul><li>27<br />Next-Generation NAC<br /> An adaptive network security approach that leverages the entire network environment<br />
  86. 86. 28<br />Visibility and Automation<br />
  87. 87. Stop by and see us at EDUCAUSE 2011<br />Philadelphia, PA October 18-21<br />Booth #1739,1741<br />Booth #2007<br />Booth #701<br />

×