© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1
Toronto, Canada
May 30 2013
BYOD and
Virtualized Desktops
Follow us on Twitter at #CiscoConnect_TO
qr.net/cc2013
Agenda
qr.net/cc2013
1
2
3
What and how to make it possible
Cisco’s distinct approach to BYOD and VDI
Services approach to BYOD and VDI - Q&A
qr.net/cc2013
Question for you…
qr.net/cc2013
BYOD?
qr.net/cc2013
BYOD?
VDI?
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
700M
smartphones sales in 2012
100M
Apple iPads forecasted in 2013
3Milli
WebEx App downloaded on iTunes
80%
Hosted Virtual Desktops in China
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Transitioning to a Post-PC World
New choices are available at every level of the traditional stack.
PC World Post-PC World
Client OS
Server
Architecture
Applications
Devices
Converging Workplace
users on Hosted Virtual Desktop (HVD) by 2016
(Gartner, 2012)
77M
Converging Workplace
of Enterprises will support BYOD
(Cisco IBSG Horizons study, 2012)
90%
Converging Workplace
of IT leaders are implementing or planning to implement
UC on VDI terminals
(Nemertes, 2012)
60%
"Bring your own device" (BYOD) drives innovation
for CIOs and the business by increasing the
number of mobile application users in the
workforce.
BYOD improves employee satisfaction, resulting in
a favorable perception of CIOs and their
organizations.
CIOs can use BYOD as a cost reduction and
avoidance mechanism.
companies expect to stop providing devices to workers by 2016
38%
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
This is not the future, it’s the new normal...
21© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BYOD touches the entire business
Lines-of-Business/HR
Compliance Operations
Security Operations
Application Team
Endpoint
Team
Network
Team
Data Center Team
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Clouds
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
ONE POLICY
Cisco Collaboration Portfolio
Cisco Collaboration Portfolio
Unified
Communica-ons
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Cisco Collaboration Portfolio
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco
Unified
Communications
Manager
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco’s Any Device Landscape (April 30, 2013)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Corporate VXI Endpoints
3,101
Other15,987 32,780 11,222 834
Cisco’s Any Device Landscape (April 30, 2013)
5,401
* Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
BYOD – Risks and Challenges
Deliver Applications on Any Device
Secure information and communications
Interoperability across devices
Enable Collaboration Beyond Corporate Boundaries
Device Management
Cisco IT BYOD Architecture
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Porta
ls
Local Exchange Unstructured
Data Cache User ProfileData
Provisioning&Management
CiscoEnterpriseStore
VDI
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53
Cisco BYOD
Smart Solution Strategy
BYOD Architecture
Identity and Policy
Identity Profiling
VLAN 10
VLAN 20
Wireless LAN
Controller
DHCP
RADIUS
SNMP
NetFlow
HTTP
DNS
Cisco® ISE
Unified Access
Management
IEEE 802.1x EAP
User Authentication
1
HQ
2:38 p.m.
Profiling to
Identify Device
2
6
Full or Partial Access
Granted
Personal
Asset
Company Asset
3
Posture
of the Device
Policy
Decision
4
5
Enforce Policy in the
Network
Corporate
Resources
Internet Only
Cisco Prime™ : Central Network Management
Unified Infrastructure: Wired and Wireless Networks
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
BYOD Validated Solution Components
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir
Improved Performance
Proactive and automatic
interference mitigation
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
AP 3600
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
Access Point Innovation
The Tablet AP, enhanced
throughput and coverage for
tablets and smart devices
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Integrated Device Profiling and Posture
Assessment
Profiling of wired and wireless devices Integrated and built into
ISE policy
Consistent Policy for
Device Categories
System-wide Visibility with Cisco Prime NCS
and ISE
Troubleshoot and Monitoring Consolidated
Data
Guest Lifecycle Management
Provide Guest Access in a seamless,
secure manner
Policy
Employee
Identity Services Engine (ISE)
Simplified Role-Based Access
Keep Existing Logical Design Manage
Security
Group Access
Policy Public Private
Employee Permit Permit
Contractor Permit Deny
Consolidated Contextual Information
Real-Time Awareness
Track Active Users
and Devices
USER ID
ACCESS RIGHTS
DEVICE (and IP/
MAC)
LOCATION
Consolidated Services
Software Packages
ISE
ACS
NAC Profiler
NAC Guest
NAC Manager
NAC Server
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
AFTER
Comprehensive User
and Access Visibility
Unified
Management
Wireless
Wired
Policy
Simple Find and solve user problems fast
Unified View of all devices by user, across networks
Lower Opex More efficient use of IT resources
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Applications
Native or virtual application delivery
Collaborative and corporate applications
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Unified
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Video
Mobility
Conferencing
Desktop PC Mac
On the desk
Full immersion TelePresence
Mobile device
BlackBerry iPhone iPad Android
Presence
Instant Messaging
Mobile softphone
Inside and outside the firewall
One link to join meeting
Call back to join meeting
Cisco Jabber
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Cisco Jabber
Best User Experience Across Broadest Range of Platforms
Win, Mac iPad, Tablet Smartphone Web
75
Automatic, seamless presence and call control
integration with WebEx
76
Automatic, seamless presence and call control
integration with WebEx
77
Automatic, seamless presence and call control
integration with WebEx
78
Automatic, seamless presence and call control
integration with WebEx
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
WebEx and Mobility
80
WebEx & TelePresence Integration
Brings in-room meeting experiences to remote users with a single touch
TelePresence User WebEx User
Single touch
to join meeting
and share content
Single click
to join meeting
and view content
and video
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Cisco WebEx Meetings for BlackBerry 2.0
• Schedule, start, join, host meetings
• View shared content
• View and Chat with attendees
• Auto callback; mute/unmute
• BlackBerry 10 and earlier
First conferencing app for
BlackBerry 10
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Cisco WebEx Meetings – Android
• Schedule, Start, Join, Host meetings
• View and chat with attendees
• View shared content
• 2-way, high quality, multipoint video
• VoIP and video over Wi-Fi, 3G/4G
• Training Center mobile access
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Cisco WebEx Meetings – iPhone and iPad Video
Experience
• 2-way, high-quality, multipoint
video
• Voice-activated video switching
• Full-screen video
• Portrait & landscape
• View content and video
simultaneously (iPad)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Cisco WebEx Meetings – iPad Content Sharing
• Share in to meetings from your mobile device
iWork documents, PDF, Word, Excel, PPT
Supported files from a Dropbox
Photos from your iPad Camera Roll
Files attached to a meeting space (WebEx Meetings)
• “How to” tips guide on
sharing throughout iPad
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Cisco BYOD + Virtualization
Session Virtualization
Session
Virtualization
Client
Application
Virtualization
Data
Center
Network
Desktop Virtualization
Desktop
Virtualization
Client
Desktop
Virtualization
Data
Center
Network
Why Virtualization?
Application Portability:
Delivering legacy/non-native apps to
broad device set
Example: iPad does not support an
application natively
Data Loss Prevention:
Securing Enterprise applications and
data
Example: avoid storing data locally, use
of virtualization for application subset –
confidential, intellectual property,
financial
Priority Use Cases: Citrix Receiver on Tablets
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
VDI and Real Time
Communications
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Cisco VXI
Cisco Virtualization Experience Infrastructure
Beyond Desktop Virtualization to Unified Workspace
Desktop
Virtualization
• More scalable
• More secure
• Simplified deployment
• Lower cost
• Collaboration
• Workspace mobility
• Network optimization
• End-to-end security
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Collaboration on Any Device with Cisco Jabber
Presence
& IM
Voice Video Conferencing Messaging
Desktop Mobile Thin Clients
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
New Software Strategy for Virtual Environments
• Cisco Virtualization Experience Media Engine
(VXME)
A new software that enables Jabber to run in
virtualized environments
• Supported on thin clients and Windows PCs
Cisco Virtualization Experience Client (VXC) 6215
Windows-based 3rd party thin clients and PCs
• Enable the same Jabber experience running on
virtual desktop as available today on your PC
Presence & IM
High definition video & wideband audio
Conferencing
Cisco VXC 6215
Dell Wyse Z50D
Windows PCs
Windows Thin Clients
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Delivering a Better Collaboration Experience
• Redesigned workspace focused on the user
experience that delivers increased productivity
• Customizable workspace to support the work
environment
• Enterprise-grade voice and video quality and
experience based on Cisco Unified
Communications
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Simplifying Desktop Virtualization for IT
• Leverages the same converged network for
voice, video, data
• Automatically prioritizes voice and video
traffic through network-based QoS and
integration with Cisco MediaNet
• Optimizes network and server resources:
bandwidth reduction from megabytes to
kilobytes
• Supported by leading desktop virtualization
partners, Citrix and VMware
Desktop Virtualization
Protocol
Cisco
VXME
Data Center
User Desktop
Media
Flow
Cisco UC
Manager
Across All Devices
SIP
Signaling
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Medianet
Delivering a Consistent Collaboration Experience
Anywhere, any content, on any device
Environments
Platform
Services
Delivery Model
Experience
Remote
Office Travel
Home
BYOD and Virtualization
Summary
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Deliver capabilities to your end users, not point products
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
BYOD and Mobility are the top priorities for most companies
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
BYOD Driving Organizational Change
Drive New
Business Models Increase Productivity
Increase Agility Attract and Retain Talent
Simplify Operations Speed Time to Market Mitigate Risks
I Can Use iPads
on My Network
Tactical Approach
Strategic Approach
End User
Business
IT
Shifting the Conversation: Whether to HOW
Applications Team:
• Which applications should I make available on any device?
• How do I optimize the performance and delivery of
applications?
Network Engineers:
• How do I troubleshoot wireless access problems?
• How do I separate device issues from network and policy issues?
• How do I ensure user experience?
Security Operations:
• How do I protect my network and data assets from unauthorized
access, malware, DLP, device loss/theft?
• How do I implement multiple security policies per user, device,
etc.?
Compliance Operations:
• How do I ensure corporate legal compliance (SOX, HIPAA,
PCI, etc.)?
Network Operations:
• What devices are on my networks?
• Which users are using what devices?
What apps are being accessed?
• What are the real-time app
performance metrics?
Business & Technical Framework:
• What are Business drivers for BYOD?
• How does IT positively impact business goals?
Translating Complex Into Manageable
BYOD
Service
Kit
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
• Will navigate through the complexities of your
BYOD requirements
• Will create a secure and practical roadmap for
deployment
• Will use proven industry relevant best practices
and methodologies
• Will provide a full scope of services to support
an accelerated deployment form strategy to
pre-production deployment
Moving into How—Accelerating Deployment
Cisco Architects
Cisco BYOD Service Kit
Accelerate BYOD deployment – from strategy to pre-production
Gather business and IT
imperatives
Create High Level future state
architecture and use cases
Develop Strategy and
Roadmap document
Assess current state environment
(LAN, WLAN, Security)
Develop recommendations based on
Cisco best practices
Create BYOD Architecture Assessment
report
Develop BYOD solution design with
potential risks identified
LAN, WLAN, ISE, CPI integration design
guidance and recommendation
Create BYOD Architecture
Design document
Deploy solution in pre-
production environment
Validate use cases in scope
As-built solution knowledge
transfer
BYOD
Service
Kit
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Strategy and Roadmap
Align the network architecture BYOD strategy with business goals and integrating
requirements that address security, compliance risks, user experience,
interoperability and integration
• High-level evaluation, capture the Customer's
BYOD business imperatives, technology
requirements, use cases and implications
• Capture the current state of the network,
including key capabilities, governance/
compliance and business drivers
• Review current infrastructure, security, WLAN
& management requirements against Cisco
Best Practices
• BYOD Strategy and Roadmap Document
• BYOD Customer Requirements Document
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Assessment
Evaluate the current network against identified requirements to provide
recommendations for adoption of future state BYOD architecture
• Assess technical controls and architecture of
existing access network, wireless and security
infrastructure vis-a-vis BYOD
• Assess the current security and risk
management programs and its ability to
support the future state requirements
• Identify strengths, weaknesses, gaps and
recommendations against Cisco best practice
BYOD solution
• BYOD Architecture Assessment Report,
including KPIs, metric dashboard
• Recommendations for adoption of future
state BYOD architecture
• Updated Customer Requirements
Document,
if applicable
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Design
Develop a BYOD architecture design for up to 3 use cases, mapping business
objectives to technical requirements for use in pre-production deployment.
• Define design recommendation, including
proposed network topology, resiliency,
availability, scalability, interoperability
• Guidance on WLAN & ISE integration,
including impact to LAN infrastructure
• Identify and document key risks in the
proposed design
• BYOD Architecture Design Document
• Configuration for WLAN controller, Cisco
Prime (WLAN), access point & ISE
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Pre-Production Deployment
Validate the Cisco BYOD solution design for up to 3 use cases through a pre-
production deployment
• Provide WLAN, Cisco Prime (WLAN), ISE &
AP configuration according to BYOD Design
• Develop BYOD solution test cases,
procedures and success criteria
• Conduct as-built BYOD solution knowledge
transfer
• BYOD solution configuration (WLAN, ISE,
Cisco Prime (WLAN), AP)
• Validate BYOD solution and use case test
results against success criteria
• Conduct as-built BYOD solution knowledge
transfer
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Please Complete Your
Session Evaluation!

Deploy & Manage BYOD and VDI Services

  • 1.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Connect© 2012 Cisco and/or its affiliates. All rights reserved. 1 Toronto, Canada May 30 2013 BYOD and Virtualized Desktops Follow us on Twitter at #CiscoConnect_TO
  • 2.
  • 3.
    Agenda qr.net/cc2013 1 2 3 What and howto make it possible Cisco’s distinct approach to BYOD and VDI Services approach to BYOD and VDI - Q&A
  • 4.
  • 5.
  • 6.
  • 7.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 1
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 12 Transitioning to a Post-PC World New choices are available at every level of the traditional stack. PC World Post-PC World Client OS Server Architecture Applications Devices
  • 13.
    Converging Workplace users onHosted Virtual Desktop (HVD) by 2016 (Gartner, 2012) 77M
  • 14.
    Converging Workplace of Enterpriseswill support BYOD (Cisco IBSG Horizons study, 2012) 90%
  • 15.
    Converging Workplace of ITleaders are implementing or planning to implement UC on VDI terminals (Nemertes, 2012) 60%
  • 16.
    "Bring your owndevice" (BYOD) drives innovation for CIOs and the business by increasing the number of mobile application users in the workforce.
  • 17.
    BYOD improves employeesatisfaction, resulting in a favorable perception of CIOs and their organizations.
  • 18.
    CIOs can useBYOD as a cost reduction and avoidance mechanism.
  • 19.
    companies expect tostop providing devices to workers by 2016 38%
  • 20.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 20 This is not the future, it’s the new normal...
  • 21.
    21© 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential BYOD touches the entire business Lines-of-Business/HR Compliance Operations Security Operations Application Team Endpoint Team Network Team Data Center Team
  • 22.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
  • 23.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Things
  • 24.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 24 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Clouds Connecting Things
  • 25.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 25 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things
  • 26.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 26 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO
  • 27.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 27 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK
  • 28.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 28 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT
  • 29.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 29 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT ONE POLICY
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
    Cisco Collaboration Portfolio CLOUD ONPREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 36.
    Cisco Collaboration Portfolio CLOUD ONPREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on Cisco Unified Communications Manager
  • 37.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Cisco’s Any Device Landscape (April 30, 2013)
  • 38.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401
  • 39.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401
  • 40.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Corporate VXI Endpoints 3,101 Other15,987 32,780 11,222 834 Cisco’s Any Device Landscape (April 30, 2013) 5,401 * Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
  • 41.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 2
  • 42.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 42 BYOD – Risks and Challenges Deliver Applications on Any Device Secure information and communications Interoperability across devices Enable Collaboration Beyond Corporate Boundaries Device Management
  • 43.
    Cisco IT BYODArchitecture
  • 44.
    Cisco IT BYODArchitecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
  • 45.
    Cisco IT BYODArchitecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
  • 46.
    Cisco IT BYODArchitecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 47.
    Cisco IT BYODArchitecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 48.
    Cisco IT BYODArchitecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management Local Exchange Unstructured Data Cache User ProfileData
  • 49.
    Cisco IT BYODArchitecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Local Exchange Unstructured Data Cache User ProfileData
  • 50.
    Cisco IT BYODArchitecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 51.
    Cisco IT BYODArchitecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 52.
    Cisco IT BYODArchitecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Porta ls Local Exchange Unstructured Data Cache User ProfileData Provisioning&Management CiscoEnterpriseStore VDI
  • 53.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco ConfidentialCisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 53 Cisco BYOD Smart Solution Strategy
  • 54.
    BYOD Architecture Identity andPolicy Identity Profiling VLAN 10 VLAN 20 Wireless LAN Controller DHCP RADIUS SNMP NetFlow HTTP DNS Cisco® ISE Unified Access Management IEEE 802.1x EAP User Authentication 1 HQ 2:38 p.m. Profiling to Identify Device 2 6 Full or Partial Access Granted Personal Asset Company Asset 3 Posture of the Device Policy Decision 4 5 Enforce Policy in the Network Corporate Resources Internet Only Cisco Prime™ : Central Network Management Unified Infrastructure: Wired and Wireless Networks
  • 55.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 55 BYOD Validated Solution Components
  • 56.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network
  • 57.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 57 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 58.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 58 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir Improved Performance Proactive and automatic interference mitigation More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 59.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 59 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 60.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 60 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 61.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 61 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation AP 3600 Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network Access Point Innovation The Tablet AP, enhanced throughput and coverage for tablets and smart devices More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 62.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 62 Integrated Device Profiling and Posture Assessment Profiling of wired and wireless devices Integrated and built into ISE policy Consistent Policy for Device Categories System-wide Visibility with Cisco Prime NCS and ISE Troubleshoot and Monitoring Consolidated Data Guest Lifecycle Management Provide Guest Access in a seamless, secure manner Policy Employee Identity Services Engine (ISE) Simplified Role-Based Access Keep Existing Logical Design Manage Security Group Access Policy Public Private Employee Permit Permit Contractor Permit Deny Consolidated Contextual Information Real-Time Awareness Track Active Users and Devices USER ID ACCESS RIGHTS DEVICE (and IP/ MAC) LOCATION Consolidated Services Software Packages ISE ACS NAC Profiler NAC Guest NAC Manager NAC Server
  • 63.
    Unified Management Find andSolve Problems Quickly
  • 64.
    BEFORE Many Windows, FragmentedView Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 65.
    BEFORE Many Windows, FragmentedView AFTER Comprehensive User and Access Visibility Unified Management Wireless Wired Policy Simple Find and solve user problems fast Unified View of all devices by user, across networks Lower Opex More efficient use of IT resources Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 66.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control
  • 67.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data
  • 68.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 69.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 70.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 70 Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms Applications Native or virtual application delivery Collaborative and corporate applications
  • 71.
    Cisco Collaboration Portfolio CLOUD ONPREMISE Unified Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 72.
    Video Mobility Conferencing Desktop PC Mac Onthe desk Full immersion TelePresence Mobile device BlackBerry iPhone iPad Android Presence Instant Messaging Mobile softphone Inside and outside the firewall One link to join meeting Call back to join meeting
  • 73.
  • 74.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 74 Cisco Jabber Best User Experience Across Broadest Range of Platforms Win, Mac iPad, Tablet Smartphone Web
  • 75.
    75 Automatic, seamless presenceand call control integration with WebEx
  • 76.
    76 Automatic, seamless presenceand call control integration with WebEx
  • 77.
    77 Automatic, seamless presenceand call control integration with WebEx
  • 78.
    78 Automatic, seamless presenceand call control integration with WebEx
  • 79.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 79 WebEx and Mobility
  • 80.
    80 WebEx & TelePresenceIntegration Brings in-room meeting experiences to remote users with a single touch TelePresence User WebEx User Single touch to join meeting and share content Single click to join meeting and view content and video
  • 81.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 81 Cisco WebEx Meetings for BlackBerry 2.0 • Schedule, start, join, host meetings • View shared content • View and Chat with attendees • Auto callback; mute/unmute • BlackBerry 10 and earlier First conferencing app for BlackBerry 10
  • 82.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 82 Cisco WebEx Meetings – Android • Schedule, Start, Join, Host meetings • View and chat with attendees • View shared content • 2-way, high quality, multipoint video • VoIP and video over Wi-Fi, 3G/4G • Training Center mobile access
  • 83.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 83 Cisco WebEx Meetings – iPhone and iPad Video Experience • 2-way, high-quality, multipoint video • Voice-activated video switching • Full-screen video • Portrait & landscape • View content and video simultaneously (iPad)
  • 84.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 84 Cisco WebEx Meetings – iPad Content Sharing • Share in to meetings from your mobile device iWork documents, PDF, Word, Excel, PPT Supported files from a Dropbox Photos from your iPad Camera Roll Files attached to a meeting space (WebEx Meetings) • “How to” tips guide on sharing throughout iPad
  • 85.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 85 Cisco BYOD + Virtualization Session Virtualization Session Virtualization Client Application Virtualization Data Center Network Desktop Virtualization Desktop Virtualization Client Desktop Virtualization Data Center Network Why Virtualization? Application Portability: Delivering legacy/non-native apps to broad device set Example: iPad does not support an application natively Data Loss Prevention: Securing Enterprise applications and data Example: avoid storing data locally, use of virtualization for application subset – confidential, intellectual property, financial Priority Use Cases: Citrix Receiver on Tablets
  • 86.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 86 VDI and Real Time Communications
  • 87.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 87 Cisco VXI Cisco Virtualization Experience Infrastructure Beyond Desktop Virtualization to Unified Workspace Desktop Virtualization • More scalable • More secure • Simplified deployment • Lower cost • Collaboration • Workspace mobility • Network optimization • End-to-end security
  • 88.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 88 Collaboration on Any Device with Cisco Jabber Presence & IM Voice Video Conferencing Messaging Desktop Mobile Thin Clients
  • 89.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 89 New Software Strategy for Virtual Environments • Cisco Virtualization Experience Media Engine (VXME) A new software that enables Jabber to run in virtualized environments • Supported on thin clients and Windows PCs Cisco Virtualization Experience Client (VXC) 6215 Windows-based 3rd party thin clients and PCs • Enable the same Jabber experience running on virtual desktop as available today on your PC Presence & IM High definition video & wideband audio Conferencing Cisco VXC 6215 Dell Wyse Z50D Windows PCs Windows Thin Clients
  • 90.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 90 Delivering a Better Collaboration Experience • Redesigned workspace focused on the user experience that delivers increased productivity • Customizable workspace to support the work environment • Enterprise-grade voice and video quality and experience based on Cisco Unified Communications
  • 91.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 91 Simplifying Desktop Virtualization for IT • Leverages the same converged network for voice, video, data • Automatically prioritizes voice and video traffic through network-based QoS and integration with Cisco MediaNet • Optimizes network and server resources: bandwidth reduction from megabytes to kilobytes • Supported by leading desktop virtualization partners, Citrix and VMware Desktop Virtualization Protocol Cisco VXME Data Center User Desktop Media Flow Cisco UC Manager Across All Devices SIP Signaling
  • 92.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 92 Medianet Delivering a Consistent Collaboration Experience Anywhere, any content, on any device Environments Platform Services Delivery Model Experience Remote Office Travel Home
  • 93.
  • 94.
    Take a phasedapproach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 95.
    Integrate UC andVDI solutions with collaboration and mobility Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 96.
    Integrate UC andVDI solutions with collaboration and mobility Deliver capabilities to your end users, not point products Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 97.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 3
  • 98.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 98 BYOD and Mobility are the top priorities for most companies
  • 99.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 99 BYOD Driving Organizational Change Drive New Business Models Increase Productivity Increase Agility Attract and Retain Talent Simplify Operations Speed Time to Market Mitigate Risks I Can Use iPads on My Network Tactical Approach Strategic Approach End User Business IT
  • 100.
    Shifting the Conversation:Whether to HOW Applications Team: • Which applications should I make available on any device? • How do I optimize the performance and delivery of applications? Network Engineers: • How do I troubleshoot wireless access problems? • How do I separate device issues from network and policy issues? • How do I ensure user experience? Security Operations: • How do I protect my network and data assets from unauthorized access, malware, DLP, device loss/theft? • How do I implement multiple security policies per user, device, etc.? Compliance Operations: • How do I ensure corporate legal compliance (SOX, HIPAA, PCI, etc.)? Network Operations: • What devices are on my networks? • Which users are using what devices? What apps are being accessed? • What are the real-time app performance metrics? Business & Technical Framework: • What are Business drivers for BYOD? • How does IT positively impact business goals?
  • 101.
    Translating Complex IntoManageable BYOD Service Kit
  • 102.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 102 • Will navigate through the complexities of your BYOD requirements • Will create a secure and practical roadmap for deployment • Will use proven industry relevant best practices and methodologies • Will provide a full scope of services to support an accelerated deployment form strategy to pre-production deployment Moving into How—Accelerating Deployment Cisco Architects
  • 103.
    Cisco BYOD ServiceKit Accelerate BYOD deployment – from strategy to pre-production Gather business and IT imperatives Create High Level future state architecture and use cases Develop Strategy and Roadmap document Assess current state environment (LAN, WLAN, Security) Develop recommendations based on Cisco best practices Create BYOD Architecture Assessment report Develop BYOD solution design with potential risks identified LAN, WLAN, ISE, CPI integration design guidance and recommendation Create BYOD Architecture Design document Deploy solution in pre- production environment Validate use cases in scope As-built solution knowledge transfer BYOD Service Kit
  • 104.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Strategy and Roadmap Align the network architecture BYOD strategy with business goals and integrating requirements that address security, compliance risks, user experience, interoperability and integration • High-level evaluation, capture the Customer's BYOD business imperatives, technology requirements, use cases and implications • Capture the current state of the network, including key capabilities, governance/ compliance and business drivers • Review current infrastructure, security, WLAN & management requirements against Cisco Best Practices • BYOD Strategy and Roadmap Document • BYOD Customer Requirements Document
  • 105.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Assessment Evaluate the current network against identified requirements to provide recommendations for adoption of future state BYOD architecture • Assess technical controls and architecture of existing access network, wireless and security infrastructure vis-a-vis BYOD • Assess the current security and risk management programs and its ability to support the future state requirements • Identify strengths, weaknesses, gaps and recommendations against Cisco best practice BYOD solution • BYOD Architecture Assessment Report, including KPIs, metric dashboard • Recommendations for adoption of future state BYOD architecture • Updated Customer Requirements Document, if applicable
  • 106.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Design Develop a BYOD architecture design for up to 3 use cases, mapping business objectives to technical requirements for use in pre-production deployment. • Define design recommendation, including proposed network topology, resiliency, availability, scalability, interoperability • Guidance on WLAN & ISE integration, including impact to LAN infrastructure • Identify and document key risks in the proposed design • BYOD Architecture Design Document • Configuration for WLAN controller, Cisco Prime (WLAN), access point & ISE
  • 107.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Pre-Production Deployment Validate the Cisco BYOD solution design for up to 3 use cases through a pre- production deployment • Provide WLAN, Cisco Prime (WLAN), ISE & AP configuration according to BYOD Design • Develop BYOD solution test cases, procedures and success criteria • Conduct as-built BYOD solution knowledge transfer • BYOD solution configuration (WLAN, ISE, Cisco Prime (WLAN), AP) • Validate BYOD solution and use case test results against success criteria • Conduct as-built BYOD solution knowledge transfer
  • 108.
    © 2012 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 108 Please Complete Your Session Evaluation!