SlideShare a Scribd company logo
Beyond BYOD
 Uncompromised Experience
 for Any Workspace

 Sangita Patel
 Enterprise Mobility Marketing

© 2012 Cisco and/or its affiliates. All rights reserved.
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
of college students/young employees
                40%                                        prefer a lower-paying job that has
                                                           more flexibility               —CCWTR




                                                           employee-owned devices used to
                 41%                                       access business applications —Forrester


                                                           of US information workers spend time
                56%                                        working outside the office —Forrester


                                                           of IT staff is struggling to keep
            100%                                           up with mobility trends           —Gartner



© 2012 Cisco and/or its affiliates. All rights reserved.                                     Cisco Confidential   2
Home, Hospital, 3G
                                                                                                    iPhone, Kindle, home
                                                             Desktop, iPad                                 laptop
                                                             Hospital, home

                                                                                       Hospital,
                                                                                      HotSpot, 3G
 High user density
 Limited scalability for
  more users/devices
 Different access needs
  by device, user,
  application, location
 Inconsistent experience
 Security challenges                                                     Android phone, tablet
 High complexity                                                         Hospital, home




                                                    Hospital, branch clinics,                             Hospital
                                                    home, 3G iPad, iPhone,                           Lenovo, BlackBerry
                                                         home laptop

  © 2012 Cisco and/or its affiliates. All rights reserved.                                                       Cisco Confidential   3
Securing                           Delivering    Managing
                           Any                             High-Quality   Complexity
                          Access                            Experience     and Scale


© 2012 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   4
Uncompromised Experience for Any Workspace




Device Onboarding                                          Unified       Uncompromised     Simplified
and Guest Access                                           Policy          Experience      Operations



        BYOD                                                         Beyond BYOD
© 2012 Cisco and/or its affiliates. All rights reserved.
                                                             Enabled By The Borderless Network   Cisco Confidential   5
BYOD
                                                                     • Zero-touch
                                                                       provisioning



                                                           Trusted
                                                            WiFi


                                                                        Unified Policy
                                                                     • MDM integration


                          Apply defined policy
                          profiles based on:
                                     Device Type
                                     User
                                     Location
                                     Posture (MDM assist)              Uncompromised
                                                                         Experience




                                                                     Simplified Operations

© 2012 Cisco and/or its affiliates. All rights reserved.                    Cisco Confidential   6
Access: Limited             Unified Policy
                                                                     Filtered EMR
                                                                                              • Identity based
                                                                     Internet                   access control
                                                                     Patient visit tracking

                                                           Trusted                            • Endpoint scanning
                                                             WiFi




                                                                                                Uncompromised
                                                                                                   Experience
                                                                                              • Client acceleration
                                                                                              • Location tracking
                                                                                                802.11u, 802.11r




                                                                                              Simplified Operations



© 2012 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   7
Trusted
                                                                            WiFi


                                 Access: Limited

                                     Internet
                                     Class Content
                                     Collaboration Apps    Access: FULL


                                                            Video Facilities
                                                            Class Content
                                                            Collaboration Apps
                                                            Student Records




                           Access: Limited

                              Internet
                                                                            Access: Limited
                              Class Content                                 Internet        Collaboration Apps

                                                                            Class Content
                              Collaboration Apps




© 2012 Cisco and/or its affiliates. All rights reserved.                                                   Cisco Confidential   8
Unified Policy
• Identity based access
  control
• ScanSafe email
  scanning




Uncompromised Experience
• Client Acceleration
• POE pass-through
• Video scale




 Simplified Operations



  © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   9
Unified Policy
 • Identity based
   access control




        Uncompromised
          Experience




  Simplified Operations
• Realtime experience
  tracking
• Policy integration
• Wired/wireless
    © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   10
  monitoring
Uncompromised Experience for Any Workspace




Device Onboarding                                          Unified       Uncompromised     Simplified
and Guest Access                                           Policy          Experience      Operations



        BYOD                                                         Beyond BYOD
© 2012 Cisco and/or its affiliates. All rights reserved.
                                                             Enabled By The Borderless Network   Cisco Confidential   11
Thank You



© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   12

More Related Content

What's hot

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco Public Relations
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
Cisco Public Relations
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
SecurEdgeNetworks
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security
 
CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021
Purdicom
 
ICC Networking Value Proposition
ICC Networking Value PropositionICC Networking Value Proposition
ICC Networking Value Proposition
International Communications Corporation
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
SSISG
 
Paul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-LearningPaul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-Learning
eLearning Consortium 電子學習聯盟
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
Cisco Russia
 
Meraki Company And Product Overview
Meraki Company And Product OverviewMeraki Company And Product Overview
Meraki Company And Product Overview
xanstevenson
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
guillaumepays
 
Data Center: BYOD & VDI
Data Center: BYOD & VDIData Center: BYOD & VDI
Data Center: BYOD & VDI
Logicalis Latam
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
Simplex
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
Marcus Reams
 

What's hot (16)

Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021CommScope RUCKUS Technical Family Day Education & MDF Q12021
CommScope RUCKUS Technical Family Day Education & MDF Q12021
 
ICC Networking Value Proposition
ICC Networking Value PropositionICC Networking Value Proposition
ICC Networking Value Proposition
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Paul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-LearningPaul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-Learning
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 
Meraki Company And Product Overview
Meraki Company And Product OverviewMeraki Company And Product Overview
Meraki Company And Product Overview
 
Meraki 2012 Corporate Brochure
Meraki 2012 Corporate BrochureMeraki 2012 Corporate Brochure
Meraki 2012 Corporate Brochure
 
Data Center: BYOD & VDI
Data Center: BYOD & VDIData Center: BYOD & VDI
Data Center: BYOD & VDI
 
Cisco Collaboration-Spark Presentation
Cisco Collaboration-Spark PresentationCisco Collaboration-Spark Presentation
Cisco Collaboration-Spark Presentation
 
01 route routing services
01 route routing services01 route routing services
01 route routing services
 

Viewers also liked

Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case study
Cisco Mobility
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Cisco Mobility
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
Cisco Mobility
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Cisco Mobility
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Cisco Mobility
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Cisco Mobility
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Cisco Mobility
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
Cisco Mobility
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
Cisco Mobility
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
Cisco Mobility
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
Cisco Mobility
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
Cisco Mobility
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
Cisco Mobility
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Cisco Mobility
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
Cisco Mobility
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Cisco Mobility
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
Cisco Mobility
 

Viewers also liked (18)

Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case study
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 

Similar to Beyond BYOD: Uncompromised Experience for Any Workspace

Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
StalwartAcademy
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
AIP Foundation
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Dirk Nicol
 
Challenges of today's wi fi hotspots and airegis solution
Challenges of today's wi fi hotspots and airegis solutionChallenges of today's wi fi hotspots and airegis solution
Challenges of today's wi fi hotspots and airegis solution
(((Airegis )))
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
ceriumnetworks
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
Juniper Networks
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
Mundo Contact
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience
Cisco Canada
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
IBM Danmark
 
Rick slides thursday (2).pptx [autosaved]
Rick slides thursday (2).pptx [autosaved]Rick slides thursday (2).pptx [autosaved]
Rick slides thursday (2).pptx [autosaved]
Cisco Collaboration
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
Gen-i
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
Advanced Logic Industries
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Advanced Logic Industries
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
Chris Pepin
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
Infoblox
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
Lars Bodenhoff
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
Shafaq Abdullah
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
Shafaq Abdullah
 

Similar to Beyond BYOD: Uncompromised Experience for Any Workspace (20)

Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
 
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
IBM Mobile Foundation POT - Overview of ibm endpoint manager for mobile devic...
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Challenges of today's wi fi hotspots and airegis solution
Challenges of today's wi fi hotspots and airegis solutionChallenges of today's wi fi hotspots and airegis solution
Challenges of today's wi fi hotspots and airegis solution
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
Rick slides thursday (2).pptx [autosaved]
Rick slides thursday (2).pptx [autosaved]Rick slides thursday (2).pptx [autosaved]
Rick slides thursday (2).pptx [autosaved]
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Virtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCSVirtualize Your Telephony Platform with Cisco UCS
Virtualize Your Telephony Platform with Cisco UCS
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Becoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by stepBecoming a mobile enterprise: step by step
Becoming a mobile enterprise: step by step
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Mobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - larsMobile advisor zenprise-pitch - lars
Mobile advisor zenprise-pitch - lars
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 

Recently uploaded

BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
SAI KAILASH R
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
ldtexsolbl
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
sunilverma7884
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
shyamraj55
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
Enterprise Knowledge
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
AmandaCheung15
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Zilliz
 
Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10
ankush9927
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
janagijoythi
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
isBullShit
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
Brian Pichman
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
alexjohnson7307
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
BrainSell Technologies
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
Priyanka Aash
 

Recently uploaded (20)

BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and DisadvantagesBLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
BLOCKCHAIN TECHNOLOGY - Advantages and Disadvantages
 
Types of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technologyTypes of Weaving loom machine & it's technology
Types of Weaving loom machine & it's technology
 
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
Girls call Kolkata 👀 XXXXXXXXXXX 👀 Rs.9.5 K Cash Payment With Room Delivery
 
Integrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecaseIntegrating Kafka with MuleSoft 4 and usecase
Integrating Kafka with MuleSoft 4 and usecase
 
Improving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning ContentImproving Learning Content Efficiency with Reusable Learning Content
Improving Learning Content Efficiency with Reusable Learning Content
 
Zaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdfZaitechno Handheld Raman Spectrometer.pdf
Zaitechno Handheld Raman Spectrometer.pdf
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
Garbage In, Garbage Out: Why poor data curation is killing your AI models (an...
 
Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10Computer HARDWARE presenattion by CWD students class 10
Computer HARDWARE presenattion by CWD students class 10
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptxMAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
MAKE MONEY ONLINE Unlock Your Income Potential Today.pptx
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Accelerating Migrations = Recommendations
Accelerating Migrations = RecommendationsAccelerating Migrations = Recommendations
Accelerating Migrations = Recommendations
 
Uncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in LibrariesUncharted Together- Navigating AI's New Frontiers in Libraries
Uncharted Together- Navigating AI's New Frontiers in Libraries
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
leewayhertz.com-Generative AI tech stack Frameworks infrastructure models and...
 
Acumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptxAcumatica vs. Sage Intacct _Construction_July (1).pptx
Acumatica vs. Sage Intacct _Construction_July (1).pptx
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
Keynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive SecurityKeynote : AI & Future Of Offensive Security
Keynote : AI & Future Of Offensive Security
 

Beyond BYOD: Uncompromised Experience for Any Workspace

  • 1. Beyond BYOD Uncompromised Experience for Any Workspace Sangita Patel Enterprise Mobility Marketing © 2012 Cisco and/or its affiliates. All rights reserved. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. of college students/young employees 40% prefer a lower-paying job that has more flexibility —CCWTR employee-owned devices used to 41% access business applications —Forrester of US information workers spend time 56% working outside the office —Forrester of IT staff is struggling to keep 100% up with mobility trends —Gartner © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Home, Hospital, 3G iPhone, Kindle, home Desktop, iPad laptop Hospital, home Hospital, HotSpot, 3G  High user density  Limited scalability for more users/devices  Different access needs by device, user, application, location  Inconsistent experience  Security challenges Android phone, tablet  High complexity Hospital, home Hospital, branch clinics, Hospital home, 3G iPad, iPhone, Lenovo, BlackBerry home laptop © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Securing Delivering Managing Any High-Quality Complexity Access Experience and Scale © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Uncompromised Experience for Any Workspace Device Onboarding Unified Uncompromised Simplified and Guest Access Policy Experience Operations BYOD Beyond BYOD © 2012 Cisco and/or its affiliates. All rights reserved. Enabled By The Borderless Network Cisco Confidential 5
  • 6. BYOD • Zero-touch provisioning Trusted WiFi Unified Policy • MDM integration Apply defined policy profiles based on: Device Type User Location Posture (MDM assist) Uncompromised Experience Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Access: Limited Unified Policy Filtered EMR • Identity based Internet access control Patient visit tracking Trusted • Endpoint scanning WiFi Uncompromised Experience • Client acceleration • Location tracking 802.11u, 802.11r Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Trusted WiFi Access: Limited Internet Class Content Collaboration Apps Access: FULL Video Facilities Class Content Collaboration Apps Student Records Access: Limited Internet Access: Limited Class Content Internet Collaboration Apps Class Content Collaboration Apps © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Unified Policy • Identity based access control • ScanSafe email scanning Uncompromised Experience • Client Acceleration • POE pass-through • Video scale Simplified Operations © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Unified Policy • Identity based access control Uncompromised Experience Simplified Operations • Realtime experience tracking • Policy integration • Wired/wireless © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 monitoring
  • 11. Uncompromised Experience for Any Workspace Device Onboarding Unified Uncompromised Simplified and Guest Access Policy Experience Operations BYOD Beyond BYOD © 2012 Cisco and/or its affiliates. All rights reserved. Enabled By The Borderless Network Cisco Confidential 11
  • 12. Thank You © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12