SlideShare a Scribd company logo
1 of 108
Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco ConnectĀ© 2012 Cisco and/or its affiliates. All rights reserved. 1
Toronto, Canada
May 30 2013
BYOD and
Virtualized Desktops
Follow us on Twitter at #CiscoConnect_TO
qr.net/cc2013
Agenda
qr.net/cc2013
1
2
3
What and how to make it possible
Ciscoā€™s distinct approach to BYOD and VDI
Services approach to BYOD and VDI - Q&A
qr.net/cc2013
Question for youā€¦
qr.net/cc2013
BYOD?
qr.net/cc2013
BYOD?
VDI?
Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
700M
smartphones sales in 2012
100M
Apple iPads forecasted in 2013
3Milli
WebEx App downloaded on iTunes
80%
Hosted Virtual Desktops in China
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Transitioning to a Post-PC World
New choices are available at every level of the traditional stack.
PC World Post-PC World
Client OS
Server
Architecture
Applications
Devices
Converging Workplace
users on Hosted Virtual Desktop (HVD) by 2016
(Gartner, 2012)
77M
Converging Workplace
of Enterprises will support BYOD
(Cisco IBSG Horizons study, 2012)
90%
Converging Workplace
of IT leaders are implementing or planning to implement
UC on VDI terminals
(Nemertes, 2012)
60%
"Bring your own device" (BYOD) drives innovation
for CIOs and the business by increasing the
number of mobile application users in the
workforce.
BYOD improves employee satisfaction, resulting in
a favorable perception of CIOs and their
organizations.
CIOs can use BYOD as a cost reduction and
avoidance mechanism.
companies expect to stop providing devices to workers by 2016
38%
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
This is not the future, itā€™s the new normal...
21Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
BYOD touches the entire business
Lines-of-Business/HR
Compliance Operations
Security Operations
Application Team
Endpoint
Team
Network
Team
Data Center Team
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Things
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting Clouds
Connecting Things
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Cisco Enterprise Network Vision
C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
Connecting People
Connecting Clouds
Connecting Things
Simple
Secure
Reduced TCO
ONE
NETW
ORK
ONEMANAGEMENT
ONE POLICY
Cisco Collaboration Portfolio
Cisco Collaboration Portfolio
Uniļ¬ed
Communica-ons
Cisco Collaboration Portfolio
Uniļ¬ed
Communica-ons
Telepresence
Cisco Collaboration Portfolio
Uniļ¬ed
Communica-ons
Telepresence
Collabora-on
Applica-ons
Cisco Collaboration Portfolio
Uniļ¬ed
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Uniļ¬ed
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Uniļ¬ed
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Cisco
Unified
Communications
Manager
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ciscoā€™s Any Device Landscape (April 30, 2013)
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Other15,987 32,780 11,222 834
Ciscoā€™s Any Device Landscape (April 30, 2013)
5,401
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Other15,987 32,780 11,222 834
Ciscoā€™s Any Device Landscape (April 30, 2013)
5,401
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Mobile Devices (BYOD)
Corporate Laptops (CYOD)
82,559 31,321*7,365
Corporate VXI Endpoints
3,101
Other15,987 32,780 11,222 834
Ciscoā€™s Any Device Landscape (April 30, 2013)
5,401
* Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
BYOD ā€“ Risks and Challenges
Deliver Applications on Any Device
Secure information and communications
Interoperability across devices
Enable Collaboration Beyond Corporate Boundaries
Device Management
Cisco IT BYOD Architecture
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Cisco IT BYOD Architecture
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Local Exchange Unstructured
Data Cache User ProfileData
Cisco IT BYOD Architecture
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Local Exchange Unstructured
Data Cache User ProfileData
VDI
Cisco IT BYOD Architecture
Devices
iPhone
Tablets
Android BlackBerry Virtual Clients Desktop/Notebooks
Device Security Encryption Behavior Analysis Anti-Virus Backup
Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
App Delivery Software
DeliveryCisco ACNS
Client
Apps
PPTWord Excel Exchange ClearCa
se Directory Bus
Apps
WebEx
Social
Blogs Meetings Jabber
Web Apps
Porta
ls
Local Exchange Unstructured
Data Cache User ProfileData
Provisioning&Management
CiscoEnterpriseStore
VDI
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco ConfidentialĀ© 2011 Cisco and/or its affiliates. All rights reserved. 53
Cisco BYOD
Smart Solution Strategy
BYOD Architecture
Identity and Policy
Identity Profiling
VLAN 10
VLAN 20
Wireless LAN
Controller
DHCP
RADIUS
SNMP
NetFlow
HTTP
DNS
CiscoĀ® ISE
Unified Access
Management
IEEE 802.1x EAP
User Authentication
1
HQ
2:38 p.m.
Profiling to
Identify Device
2
6
Full or Partial Access
Granted
Personal
Asset
Company Asset
3
Posture
of the Device
Policy
Decision
4
5
Enforce Policy in the
Network
Corporate
Resources
Internet Only
Cisco Primeā„¢ : Central Network Management
Unified Infrastructure: Wired and Wireless Networks
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
BYOD Validated Solution Components
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir
Improved Performance
Proactive and automatic
interference mitigation
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Wireless Access for BYOD
Cisco Mobility Technology for High Performance Wireless Network
CleanAir ClientLink 2.0 VideoStream
Improved Performance
Proactive and automatic
interference mitigation
AP 3600
Improved Performance
Proactive and automatic beam
forming for 802.11n and legacy
clients
Improved Performance
Wired multicast over a
wireless network
Access Point Innovation
The Tablet AP, enhanced
throughput and coverage for
tablets and smart devices
More reliable RF coverage/
thruput
Better signal strength for
clients
More scalable broadcast video Higher performance and
coverage
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Integrated Device Profiling and Posture
Assessment
Profiling of wired and wireless devices Integrated and built into
ISE policy
Consistent Policy for
Device Categories
System-wide Visibility with Cisco Prime NCS
and ISE
Troubleshoot and Monitoring Consolidated
Data
Guest Lifecycle Management
Provide Guest Access in a seamless,
secure manner
Policy
Employee
Identity Services Engine (ISE)
Simplified Role-Based Access
Keep Existing Logical Design Manage
Security
Group Access
Policy Public Private
Employee Permit Permit
Contractor Permit Deny
Consolidated Contextual Information
Real-Time Awareness
Track Active Users
and Devices
USER ID
ACCESS RIGHTS
DEVICE (and IP/
MAC)
LOCATION
Consolidated Services
Software Packages
ISE
ACS
NAC Profiler
NAC Guest
NAC Manager
NAC Server
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
BEFORE
Many Windows, Fragmented View
AFTER
Comprehensive User
and Access Visibility
Unified
Management
Wireless
Wired
Policy
Simple Find and solve user problems fast
Unified View of all devices by user, across networks
Lower Opex More efficient use of IT resources
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Bringing it All Together
Unified Access
Scalable converged wireless and wired network
Identity-based access control
Security/Policy
Data loss and threat prevention
Context aware access to data
Management
Single system for wired / wireless / VPN
Provisioning and Mobile Device Management
User Experience
Uncompromised video, voice in any deployment mode
Consistent, portable across platforms
Applications
Native or virtual application delivery
Collaborative and corporate applications
Cisco Collaboration Portfolio
CLOUD
ON PREMISE
Uniļ¬ed
Communica-ons
Telepresence
Collabora-on
Applica-ons
Customer
Collabora-on
Video
Mobility
Conferencing
Desktop PC Mac
On the desk
Full immersion TelePresence
Mobile device
BlackBerry iPhone iPad Android
Presence
Instant Messaging
Mobile softphone
Inside and outside the firewall
One link to join meeting
Call back to join meeting
Cisco Jabber
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Cisco Jabber
Best User Experience Across Broadest Range of Platforms
Win, Mac iPad, Tablet Smartphone Web
75
Automatic, seamless presence and call control
integration with WebEx
76
Automatic, seamless presence and call control
integration with WebEx
77
Automatic, seamless presence and call control
integration with WebEx
78
Automatic, seamless presence and call control
integration with WebEx
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
WebEx and Mobility
80
WebEx & TelePresence Integration
Brings in-room meeting experiences to remote users with a single touch
TelePresence User WebEx User
Single touch
to join meeting
and share content
Single click
to join meeting
and view content
and video
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
Cisco WebEx Meetings for BlackBerry 2.0
ā€¢ Schedule, start, join, host meetings
ā€¢ View shared content
ā€¢ View and Chat with attendees
ā€¢ Auto callback; mute/unmute
ā€¢ BlackBerry 10 and earlier
First conferencing app for
BlackBerry 10
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
Cisco WebEx Meetings ā€“ Android
ā€¢ Schedule, Start, Join, Host meetings
ā€¢ View and chat with attendees
ā€¢ View shared content
ā€¢ 2-way, high quality, multipoint video
ā€¢ VoIP and video over Wi-Fi, 3G/4G
ā€¢ Training Center mobile access
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
Cisco WebEx Meetings ā€“ iPhone and iPad Video
Experience
ā€¢ 2-way, high-quality, multipoint
video
ā€¢ Voice-activated video switching
ā€¢ Full-screen video
ā€¢ Portrait & landscape
ā€¢ View content and video
simultaneously (iPad)
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
Cisco WebEx Meetings ā€“ iPad Content Sharing
ā€¢ Share in to meetings from your mobile device
iWork documents, PDF, Word, Excel, PPT
Supported files from a Dropbox
Photos from your iPad Camera Roll
Files attached to a meeting space (WebEx Meetings)
ā€¢ ā€œHow toā€ tips guide on
sharing throughout iPad
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
Cisco BYOD + Virtualization
Session Virtualization
Session
Virtualization
Client
Application
Virtualization
Data
Center
Network
Desktop Virtualization
Desktop
Virtualization
Client
Desktop
Virtualization
Data
Center
Network
Why Virtualization?
Application Portability:
Delivering legacy/non-native apps to
broad device set
Example: iPad does not support an
application natively
Data Loss Prevention:
Securing Enterprise applications and
data
Example: avoid storing data locally, use
of virtualization for application subset ā€“
confidential, intellectual property,
financial
Priority Use Cases: Citrix Receiver on Tablets
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
VDI and Real Time
Communications
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
Cisco VXI
Cisco Virtualization Experience Infrastructure
Beyond Desktop Virtualization to Unified Workspace
Desktop
Virtualization
ā€¢ More scalable
ā€¢ More secure
ā€¢ Simplified deployment
ā€¢ Lower cost
ā€¢ Collaboration
ā€¢ Workspace mobility
ā€¢ Network optimization
ā€¢ End-to-end security
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
Collaboration on Any Device with Cisco Jabber
Presence
& IM
Voice Video Conferencing Messaging
Desktop Mobile Thin Clients
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
New Software Strategy for Virtual Environments
ā€¢ Cisco Virtualization Experience Media Engine
(VXME)
A new software that enables Jabber to run in
virtualized environments
ā€¢ Supported on thin clients and Windows PCs
Cisco Virtualization Experience Client (VXC) 6215
Windows-based 3rd party thin clients and PCs
ā€¢ Enable the same Jabber experience running on
virtual desktop as available today on your PC
Presence & IM
High definition video & wideband audio
Conferencing
Cisco VXC 6215
Dell Wyse Z50D
Windows PCs
Windows Thin Clients
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
Delivering a Better Collaboration Experience
ā€¢ Redesigned workspace focused on the user
experience that delivers increased productivity
ā€¢ Customizable workspace to support the work
environment
ā€¢ Enterprise-grade voice and video quality and
experience based on Cisco Unified
Communications
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
Simplifying Desktop Virtualization for IT
ā€¢ Leverages the same converged network for
voice, video, data
ā€¢ Automatically prioritizes voice and video
traffic through network-based QoS and
integration with Cisco MediaNet
ā€¢ Optimizes network and server resources:
bandwidth reduction from megabytes to
kilobytes
ā€¢ Supported by leading desktop virtualization
partners, Citrix and VMware
Desktop Virtualization
Protocol
Cisco
VXME
Data Center
User Desktop
Media
Flow
Cisco UC
Manager
Across All Devices
SIP
Signaling
Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
Medianet
Delivering a Consistent Collaboration Experience
Anywhere, any content, on any device
Environments
Platform
Services
Delivery Model
Experience
Remote
Office Travel
Home
BYOD and Virtualization
Summary
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Integrate UC and VDI solutions with collaboration and mobility
Deliver capabilities to your end users, not point products
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
3
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
BYOD and Mobility are the top priorities for most companies
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99
BYOD Driving Organizational Change
Drive New
Business Models Increase Productivity
Increase Agility Attract and Retain Talent
Simplify Operations Speed Time to Market Mitigate Risks
I Can Use iPads
on My Network
Tactical Approach
Strategic Approach
End User
Business
IT
Shifting the Conversation: Whether to HOW
Applications Team:
ā€¢ Which applications should I make available on any device?
ā€¢ How do I optimize the performance and delivery of
applications?
Network Engineers:
ā€¢ How do I troubleshoot wireless access problems?
ā€¢ How do I separate device issues from network and policy issues?
ā€¢ How do I ensure user experience?
Security Operations:
ā€¢ How do I protect my network and data assets from unauthorized
access, malware, DLP, device loss/theft?
ā€¢ How do I implement multiple security policies per user, device,
etc.?
Compliance Operations:
ā€¢ How do I ensure corporate legal compliance (SOX, HIPAA,
PCI, etc.)?
Network Operations:
ā€¢ What devices are on my networks?
ā€¢ Which users are using what devices?
What apps are being accessed?
ā€¢ What are the real-time app
performance metrics?
Business & Technical Framework:
ā€¢ What are Business drivers for BYOD?
ā€¢ How does IT positively impact business goals?
Translating Complex Into Manageable
BYOD
Service
Kit
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102
ā€¢ Will navigate through the complexities of your
BYOD requirements
ā€¢ Will create a secure and practical roadmap for
deployment
ā€¢ Will use proven industry relevant best practices
and methodologies
ā€¢ Will provide a full scope of services to support
an accelerated deployment form strategy to
pre-production deployment
Moving into Howā€”Accelerating Deployment
Cisco Architects
Cisco BYOD Service Kit
Accelerate BYOD deployment ā€“ from strategy to pre-production
Gather business and IT
imperatives
Create High Level future state
architecture and use cases
Develop Strategy and
Roadmap document
Assess current state environment
(LAN, WLAN, Security)
Develop recommendations based on
Cisco best practices
Create BYOD Architecture Assessment
report
Develop BYOD solution design with
potential risks identified
LAN, WLAN, ISE, CPI integration design
guidance and recommendation
Create BYOD Architecture
Design document
Deploy solution in pre-
production environment
Validate use cases in scope
As-built solution knowledge
transfer
BYOD
Service
Kit
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Strategy and Roadmap
Align the network architecture BYOD strategy with business goals and integrating
requirements that address security, compliance risks, user experience,
interoperability and integration
ā€¢ High-level evaluation, capture the Customer's
BYOD business imperatives, technology
requirements, use cases and implications
ā€¢ Capture the current state of the network,
including key capabilities, governance/
compliance and business drivers
ā€¢ Review current infrastructure, security, WLAN
& management requirements against Cisco
Best Practices
ā€¢ BYOD Strategy and Roadmap Document
ā€¢ BYOD Customer Requirements Document
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Assessment
Evaluate the current network against identified requirements to provide
recommendations for adoption of future state BYOD architecture
ā€¢ Assess technical controls and architecture of
existing access network, wireless and security
infrastructure vis-a-vis BYOD
ā€¢ Assess the current security and risk
management programs and its ability to
support the future state requirements
ā€¢ Identify strengths, weaknesses, gaps and
recommendations against Cisco best practice
BYOD solution
ā€¢ BYOD Architecture Assessment Report,
including KPIs, metric dashboard
ā€¢ Recommendations for adoption of future
state BYOD architecture
ā€¢ Updated Customer Requirements
Document,
if applicable
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Foundational Design
Develop a BYOD architecture design for up to 3 use cases, mapping business
objectives to technical requirements for use in pre-production deployment.
ā€¢ Define design recommendation, including
proposed network topology, resiliency,
availability, scalability, interoperability
ā€¢ Guidance on WLAN & ISE integration,
including impact to LAN infrastructure
ā€¢ Identify and document key risks in the
proposed design
ā€¢ BYOD Architecture Design Document
ā€¢ Configuration for WLAN controller, Cisco
Prime (WLAN), access point & ISE
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Objective
Activities Deliverables
Pre-Production Deployment
Validate the Cisco BYOD solution design for up to 3 use cases through a pre-
production deployment
ā€¢ Provide WLAN, Cisco Prime (WLAN), ISE &
AP configuration according to BYOD Design
ā€¢ Develop BYOD solution test cases,
procedures and success criteria
ā€¢ Conduct as-built BYOD solution knowledge
transfer
ā€¢ BYOD solution configuration (WLAN, ISE,
Cisco Prime (WLAN), AP)
ā€¢ Validate BYOD solution and use case test
results against success criteria
ā€¢ Conduct as-built BYOD solution knowledge
transfer
Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
Please Complete Your
Session Evaluation!

More Related Content

What's hot

Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsRick Huijbregts
Ā 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
Ā 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
Ā 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
Ā 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF MĆ©xico
Ā 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
Ā 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the EnterpriseJohn Rhoton
Ā 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureNetworkCollaborators
Ā 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationNetworkCollaborators
Ā 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integrationCeline George
Ā 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
Ā 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
Ā 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessNetworkCollaborators
Ā 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
Ā 
Intelā€™s Strategy in IoT Standards
Intelā€™s Strategy in IoT StandardsIntelā€™s Strategy in IoT Standards
Intelā€™s Strategy in IoT StandardsNFC Forum
Ā 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Ranjan Jain
Ā 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USIngrid Fernandez, PhD
Ā 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationFIDO Alliance
Ā 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
Ā 
September Patch Tuesday- 2020
September Patch Tuesday- 2020September Patch Tuesday- 2020
September Patch Tuesday- 2020Ivanti
Ā 

What's hot (20)

Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Ā 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Ā 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
Ā 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
Ā 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
Ā 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
Ā 
IPv6 for the Enterprise
IPv6 for the EnterpriseIPv6 for the Enterprise
IPv6 for the Enterprise
Ā 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Ā 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
Ā 
Odoo iot box integration
Odoo iot box integrationOdoo iot box integration
Odoo iot box integration
Ā 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
Ā 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
Ā 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Ā 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Ā 
Intelā€™s Strategy in IoT Standards
Intelā€™s Strategy in IoT StandardsIntelā€™s Strategy in IoT Standards
Intelā€™s Strategy in IoT Standards
Ā 
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Inbound Federation and Zero Sign On (ZSO) by Ranjan Jain at Ping Identity Wor...
Ā 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ā 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
Ā 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Ā 
September Patch Tuesday- 2020
September Patch Tuesday- 2020September Patch Tuesday- 2020
September Patch Tuesday- 2020
Ā 

Viewers also liked

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
Ā 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data CentreCisco Canada
Ā 
Creating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCreating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCisco Canada
Ā 
Innovation for Country Transformation
Innovation for Country TransformationInnovation for Country Transformation
Innovation for Country TransformationCisco Canada
Ā 
Smart+Connected Communities Canada
Smart+Connected Communities CanadaSmart+Connected Communities Canada
Smart+Connected Communities CanadaCisco Canada
Ā 
The Next Five Years
The Next Five YearsThe Next Five Years
The Next Five YearsCisco Canada
Ā 
George Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyGeorge Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyCisco Canada
Ā 
Empowering a High-Performance Organization
Empowering a High-Performance OrganizationEmpowering a High-Performance Organization
Empowering a High-Performance OrganizationCisco Canada
Ā 
Working Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than EverWorking Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than EverCisco Canada
Ā 
Innovating the GTA with Ellisdon
Innovating the GTA with EllisdonInnovating the GTA with Ellisdon
Innovating the GTA with EllisdonCisco Canada
Ā 
The Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy TechnologiesThe Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy TechnologiesCisco Canada
Ā 
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...Cisco Canada
Ā 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
Ā 
Has video really killed the audio star?
Has video really killed the audio star?Has video really killed the audio star?
Has video really killed the audio star?Cisco Canada
Ā 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for youCisco Canada
Ā 
Simplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybrideSimplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybrideCisco Canada
Ā 
Jabber making the most of
Jabber making the most ofJabber making the most of
Jabber making the most ofCisco Canada
Ā 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesCisco Canada
Ā 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transitionCisco Canada
Ā 
Better Network Management Through Network Programmability
Better Network Management Through Network ProgrammabilityBetter Network Management Through Network Programmability
Better Network Management Through Network ProgrammabilityCisco Canada
Ā 

Viewers also liked (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Ā 
The Evolution of the Data Centre
The Evolution of the Data CentreThe Evolution of the Data Centre
The Evolution of the Data Centre
Ā 
Creating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar SeriesCreating a Collaborative Workplace Culture Webinar Series
Creating a Collaborative Workplace Culture Webinar Series
Ā 
Innovation for Country Transformation
Innovation for Country TransformationInnovation for Country Transformation
Innovation for Country Transformation
Ā 
Smart+Connected Communities Canada
Smart+Connected Communities CanadaSmart+Connected Communities Canada
Smart+Connected Communities Canada
Ā 
The Next Five Years
The Next Five YearsThe Next Five Years
The Next Five Years
Ā 
George Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyGeorge Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economy
Ā 
Empowering a High-Performance Organization
Empowering a High-Performance OrganizationEmpowering a High-Performance Organization
Empowering a High-Performance Organization
Ā 
Working Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than EverWorking Smarter: Why We Need to be Better Than Ever
Working Smarter: Why We Need to be Better Than Ever
Ā 
Innovating the GTA with Ellisdon
Innovating the GTA with EllisdonInnovating the GTA with Ellisdon
Innovating the GTA with Ellisdon
Ā 
The Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy TechnologiesThe Role of ICT for the future of Clean Energy Technologies
The Role of ICT for the future of Clean Energy Technologies
Ā 
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...
Managing the Data Deluge: Ciscoā€™s Nick Adamo on how SPs can support the mobil...
Ā 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
Ā 
Has video really killed the audio star?
Has video really killed the audio star?Has video really killed the audio star?
Has video really killed the audio star?
Ā 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
Ā 
Simplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybrideSimplifier le deploiement d'applications dans le nuage hybride
Simplifier le deploiement d'applications dans le nuage hybride
Ā 
Jabber making the most of
Jabber making the most ofJabber making the most of
Jabber making the most of
Ā 
De-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco ServicesDe-Risk Data Center Projects With Cisco Services
De-Risk Data Center Projects With Cisco Services
Ā 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transition
Ā 
Better Network Management Through Network Programmability
Better Network Management Through Network ProgrammabilityBetter Network Management Through Network Programmability
Better Network Management Through Network Programmability
Ā 

Similar to Deploy & Manage BYOD and VDI Services

Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
Ā 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
Ā 
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium)
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium) CISCOā€™s Cloud Journey (Keynote at Cloud Symposium)
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium) Marcus McEwen
Ā 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handoutSarmad Ibrahim
Ā 
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚?
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚? ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚?
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚? Cisco Russia
Ā 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes
Ā 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
Ā 
Smau milano 2013 lorenzo fava
Smau milano 2013 lorenzo favaSmau milano 2013 lorenzo fava
Smau milano 2013 lorenzo favaSMAU
Ā 
Cloud connected Solutions
Cloud connected SolutionsCloud connected Solutions
Cloud connected SolutionsMaurizio Taffone
Ā 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoEMatteo Masi
Ā 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
Ā 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
Ā 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel Bessie Wang
Ā 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
Ā 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
Ā 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_FabricPaulo Renato
Ā 
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Marc Lijour, OCT, BSc, MBA
Ā 
Education in 2015
Education in 2015Education in 2015
Education in 2015Cisco Canada
Ā 

Similar to Deploy & Manage BYOD and VDI Services (20)

Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
Ā 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
Ā 
Brkcld 2215
Brkcld 2215Brkcld 2215
Brkcld 2215
Ā 
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium)
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium) CISCOā€™s Cloud Journey (Keynote at Cloud Symposium)
CISCOā€™s Cloud Journey (Keynote at Cloud Symposium)
Ā 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handout
Ā 
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚?
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚? ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚?
ŠšŠ¾Ń€ŠæŠ¾Ń€Š°Ń‚ŠøŠ²Š½Ń‹Šµ сŠµŃ‚Šø чŠµŃ€ŠµŠ· 5 Š»ŠµŃ‚: чтŠ¾ Š½Š°Ń Š¶Š“ŠµŃ‚?
Ā 
ThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital WorkshopThousandEyes Enterprise Digital Workshop
ThousandEyes Enterprise Digital Workshop
Ā 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
Ā 
Smau milano 2013 lorenzo fava
Smau milano 2013 lorenzo favaSmau milano 2013 lorenzo fava
Smau milano 2013 lorenzo fava
Ā 
Cloud connected Solutions
Cloud connected SolutionsCloud connected Solutions
Cloud connected Solutions
Ā 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
Ā 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
Ā 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
Ā 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
Ā 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
Ā 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
Ā 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
Ā 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
Ā 
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Cisco at DevTO - Tomorrow Starts Now for Sheridan College Students (July 28, ...
Ā 
Education in 2015
Education in 2015Education in 2015
Education in 2015
Ā 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
Ā 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
Ā 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
Ā 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
Ā 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
Ā 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
Ā 
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Canada
Ā 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Ā 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
Ā 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
Ā 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
Ā 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
Ā 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
Ā 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Ā 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
Ā 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Ā 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
Ā 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
Ā 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
Ā 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
Ā 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
Ā 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
Ā 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Ā 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
Ā 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Ā 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
Ā 
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Ā 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
Ā 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
Ā 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
Ā 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
Ā 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Ā 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Ā 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Ā 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Ā 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
Ā 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
Ā 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
Ā 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Ā 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Ā 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
Ā 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphNeo4j
Ā 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
Ā 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Ā 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Ā 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Ā 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Ā 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Ā 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Ā 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Ā 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Ā 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Ā 
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge GraphSIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
SIEMENS: RAPUNZEL ā€“ A Tale About Knowledge Graph
Ā 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
Ā 

Deploy & Manage BYOD and VDI Services

  • 1. Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco ConnectĀ© 2012 Cisco and/or its affiliates. All rights reserved. 1 Toronto, Canada May 30 2013 BYOD and Virtualized Desktops Follow us on Twitter at #CiscoConnect_TO
  • 3. Agenda qr.net/cc2013 1 2 3 What and how to make it possible Ciscoā€™s distinct approach to BYOD and VDI Services approach to BYOD and VDI - Q&A
  • 7. Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 12. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Transitioning to a Post-PC World New choices are available at every level of the traditional stack. PC World Post-PC World Client OS Server Architecture Applications Devices
  • 13. Converging Workplace users on Hosted Virtual Desktop (HVD) by 2016 (Gartner, 2012) 77M
  • 14. Converging Workplace of Enterprises will support BYOD (Cisco IBSG Horizons study, 2012) 90%
  • 15. Converging Workplace of IT leaders are implementing or planning to implement UC on VDI terminals (Nemertes, 2012) 60%
  • 16. "Bring your own device" (BYOD) drives innovation for CIOs and the business by increasing the number of mobile application users in the workforce.
  • 17. BYOD improves employee satisfaction, resulting in a favorable perception of CIOs and their organizations.
  • 18. CIOs can use BYOD as a cost reduction and avoidance mechanism.
  • 19. companies expect to stop providing devices to workers by 2016 38%
  • 20. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 This is not the future, itā€™s the new normal...
  • 21. 21Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BYOD touches the entire business Lines-of-Business/HR Compliance Operations Security Operations Application Team Endpoint Team Network Team Data Center Team
  • 22. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e
  • 23. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Things
  • 24. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting Clouds Connecting Things
  • 25. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things
  • 26. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO
  • 27. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK
  • 28. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT
  • 29. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Cisco Enterprise Network Vision C i s c o O N E E n t e r p r i s e A r c h i t e c t u r e Connecting People Connecting Clouds Connecting Things Simple Secure Reduced TCO ONE NETW ORK ONEMANAGEMENT ONE POLICY
  • 35. Cisco Collaboration Portfolio CLOUD ON PREMISE Uniļ¬ed Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 36. Cisco Collaboration Portfolio CLOUD ON PREMISE Uniļ¬ed Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on Cisco Unified Communications Manager
  • 37. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ciscoā€™s Any Device Landscape (April 30, 2013)
  • 38. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Other15,987 32,780 11,222 834 Ciscoā€™s Any Device Landscape (April 30, 2013) 5,401
  • 39. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Other15,987 32,780 11,222 834 Ciscoā€™s Any Device Landscape (April 30, 2013) 5,401
  • 40. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Mobile Devices (BYOD) Corporate Laptops (CYOD) 82,559 31,321*7,365 Corporate VXI Endpoints 3,101 Other15,987 32,780 11,222 834 Ciscoā€™s Any Device Landscape (April 30, 2013) 5,401 * Apple Mac figure is adjusted down from last month due to some machines being counted more than once in error
  • 41. Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 42. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 BYOD ā€“ Risks and Challenges Deliver Applications on Any Device Secure information and communications Interoperability across devices Enable Collaboration Beyond Corporate Boundaries Device Management
  • 43. Cisco IT BYOD Architecture
  • 44. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired
  • 45. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management
  • 46. Cisco IT BYOD Architecture Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 47. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management
  • 48. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management Local Exchange Unstructured Data Cache User ProfileData
  • 49. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Local Exchange Unstructured Data Cache User ProfileData
  • 50. Cisco IT BYOD Architecture Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 51. Cisco IT BYOD Architecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Local Exchange Unstructured Data Cache User ProfileData VDI
  • 52. Cisco IT BYOD Architecture Devices iPhone Tablets Android BlackBerry Virtual Clients Desktop/Notebooks Device Security Encryption Behavior Analysis Anti-Virus Backup Connectivity Service Providers External Wi-Fi Internal Wi-Fi Wired Secure Connectivity Cisco Access Control Server Cisco AnyConnect VPNNative Identity Management Policy/Management Mobile Device Management Cisco Identity Services EngineDesktop Device Management App Delivery Software DeliveryCisco ACNS Client Apps PPTWord Excel Exchange ClearCa se Directory Bus Apps WebEx Social Blogs Meetings Jabber Web Apps Porta ls Local Exchange Unstructured Data Cache User ProfileData Provisioning&Management CiscoEnterpriseStore VDI
  • 53. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialCisco ConfidentialĀ© 2011 Cisco and/or its affiliates. All rights reserved. 53 Cisco BYOD Smart Solution Strategy
  • 54. BYOD Architecture Identity and Policy Identity Profiling VLAN 10 VLAN 20 Wireless LAN Controller DHCP RADIUS SNMP NetFlow HTTP DNS CiscoĀ® ISE Unified Access Management IEEE 802.1x EAP User Authentication 1 HQ 2:38 p.m. Profiling to Identify Device 2 6 Full or Partial Access Granted Personal Asset Company Asset 3 Posture of the Device Policy Decision 4 5 Enforce Policy in the Network Corporate Resources Internet Only Cisco Primeā„¢ : Central Network Management Unified Infrastructure: Wired and Wireless Networks
  • 55. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 BYOD Validated Solution Components
  • 56. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network
  • 57. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 58. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir Improved Performance Proactive and automatic interference mitigation More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 59. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 60. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 61. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Wireless Access for BYOD Cisco Mobility Technology for High Performance Wireless Network CleanAir ClientLink 2.0 VideoStream Improved Performance Proactive and automatic interference mitigation AP 3600 Improved Performance Proactive and automatic beam forming for 802.11n and legacy clients Improved Performance Wired multicast over a wireless network Access Point Innovation The Tablet AP, enhanced throughput and coverage for tablets and smart devices More reliable RF coverage/ thruput Better signal strength for clients More scalable broadcast video Higher performance and coverage
  • 62. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Integrated Device Profiling and Posture Assessment Profiling of wired and wireless devices Integrated and built into ISE policy Consistent Policy for Device Categories System-wide Visibility with Cisco Prime NCS and ISE Troubleshoot and Monitoring Consolidated Data Guest Lifecycle Management Provide Guest Access in a seamless, secure manner Policy Employee Identity Services Engine (ISE) Simplified Role-Based Access Keep Existing Logical Design Manage Security Group Access Policy Public Private Employee Permit Permit Contractor Permit Deny Consolidated Contextual Information Real-Time Awareness Track Active Users and Devices USER ID ACCESS RIGHTS DEVICE (and IP/ MAC) LOCATION Consolidated Services Software Packages ISE ACS NAC Profiler NAC Guest NAC Manager NAC Server
  • 63. Unified Management Find and Solve Problems Quickly
  • 64. BEFORE Many Windows, Fragmented View Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 65. BEFORE Many Windows, Fragmented View AFTER Comprehensive User and Access Visibility Unified Management Wireless Wired Policy Simple Find and solve user problems fast Unified View of all devices by user, across networks Lower Opex More efficient use of IT resources Siloed Inefficient Operational Model Repetitive Manual correlation of data Error Prone Consumes time and resources Wireless Identity Wired Unified Management Find and Solve Problems Quickly
  • 66. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control
  • 67. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data
  • 68. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 69. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms
  • 70. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Bringing it All Together Unified Access Scalable converged wireless and wired network Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management User Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms Applications Native or virtual application delivery Collaborative and corporate applications
  • 71. Cisco Collaboration Portfolio CLOUD ON PREMISE Uniļ¬ed Communica-ons Telepresence Collabora-on Applica-ons Customer Collabora-on
  • 72. Video Mobility Conferencing Desktop PC Mac On the desk Full immersion TelePresence Mobile device BlackBerry iPhone iPad Android Presence Instant Messaging Mobile softphone Inside and outside the firewall One link to join meeting Call back to join meeting
  • 74. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 Cisco Jabber Best User Experience Across Broadest Range of Platforms Win, Mac iPad, Tablet Smartphone Web
  • 75. 75 Automatic, seamless presence and call control integration with WebEx
  • 76. 76 Automatic, seamless presence and call control integration with WebEx
  • 77. 77 Automatic, seamless presence and call control integration with WebEx
  • 78. 78 Automatic, seamless presence and call control integration with WebEx
  • 79. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79 WebEx and Mobility
  • 80. 80 WebEx & TelePresence Integration Brings in-room meeting experiences to remote users with a single touch TelePresence User WebEx User Single touch to join meeting and share content Single click to join meeting and view content and video
  • 81. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81 Cisco WebEx Meetings for BlackBerry 2.0 ā€¢ Schedule, start, join, host meetings ā€¢ View shared content ā€¢ View and Chat with attendees ā€¢ Auto callback; mute/unmute ā€¢ BlackBerry 10 and earlier First conferencing app for BlackBerry 10
  • 82. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82 Cisco WebEx Meetings ā€“ Android ā€¢ Schedule, Start, Join, Host meetings ā€¢ View and chat with attendees ā€¢ View shared content ā€¢ 2-way, high quality, multipoint video ā€¢ VoIP and video over Wi-Fi, 3G/4G ā€¢ Training Center mobile access
  • 83. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83 Cisco WebEx Meetings ā€“ iPhone and iPad Video Experience ā€¢ 2-way, high-quality, multipoint video ā€¢ Voice-activated video switching ā€¢ Full-screen video ā€¢ Portrait & landscape ā€¢ View content and video simultaneously (iPad)
  • 84. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84 Cisco WebEx Meetings ā€“ iPad Content Sharing ā€¢ Share in to meetings from your mobile device iWork documents, PDF, Word, Excel, PPT Supported files from a Dropbox Photos from your iPad Camera Roll Files attached to a meeting space (WebEx Meetings) ā€¢ ā€œHow toā€ tips guide on sharing throughout iPad
  • 85. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85 Cisco BYOD + Virtualization Session Virtualization Session Virtualization Client Application Virtualization Data Center Network Desktop Virtualization Desktop Virtualization Client Desktop Virtualization Data Center Network Why Virtualization? Application Portability: Delivering legacy/non-native apps to broad device set Example: iPad does not support an application natively Data Loss Prevention: Securing Enterprise applications and data Example: avoid storing data locally, use of virtualization for application subset ā€“ confidential, intellectual property, financial Priority Use Cases: Citrix Receiver on Tablets
  • 86. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86 VDI and Real Time Communications
  • 87. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87 Cisco VXI Cisco Virtualization Experience Infrastructure Beyond Desktop Virtualization to Unified Workspace Desktop Virtualization ā€¢ More scalable ā€¢ More secure ā€¢ Simplified deployment ā€¢ Lower cost ā€¢ Collaboration ā€¢ Workspace mobility ā€¢ Network optimization ā€¢ End-to-end security
  • 88. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88 Collaboration on Any Device with Cisco Jabber Presence & IM Voice Video Conferencing Messaging Desktop Mobile Thin Clients
  • 89. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89 New Software Strategy for Virtual Environments ā€¢ Cisco Virtualization Experience Media Engine (VXME) A new software that enables Jabber to run in virtualized environments ā€¢ Supported on thin clients and Windows PCs Cisco Virtualization Experience Client (VXC) 6215 Windows-based 3rd party thin clients and PCs ā€¢ Enable the same Jabber experience running on virtual desktop as available today on your PC Presence & IM High definition video & wideband audio Conferencing Cisco VXC 6215 Dell Wyse Z50D Windows PCs Windows Thin Clients
  • 90. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90 Delivering a Better Collaboration Experience ā€¢ Redesigned workspace focused on the user experience that delivers increased productivity ā€¢ Customizable workspace to support the work environment ā€¢ Enterprise-grade voice and video quality and experience based on Cisco Unified Communications
  • 91. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91 Simplifying Desktop Virtualization for IT ā€¢ Leverages the same converged network for voice, video, data ā€¢ Automatically prioritizes voice and video traffic through network-based QoS and integration with Cisco MediaNet ā€¢ Optimizes network and server resources: bandwidth reduction from megabytes to kilobytes ā€¢ Supported by leading desktop virtualization partners, Citrix and VMware Desktop Virtualization Protocol Cisco VXME Data Center User Desktop Media Flow Cisco UC Manager Across All Devices SIP Signaling
  • 92. Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92 Medianet Delivering a Consistent Collaboration Experience Anywhere, any content, on any device Environments Platform Services Delivery Model Experience Remote Office Travel Home
  • 94. Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 95. Integrate UC and VDI solutions with collaboration and mobility Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 96. Integrate UC and VDI solutions with collaboration and mobility Deliver capabilities to your end users, not point products Take a phased approach to BYOD and evaluate use cases BYOD and Virtualization Summary
  • 97. Ā© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 98. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 BYOD and Mobility are the top priorities for most companies
  • 99. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 BYOD Driving Organizational Change Drive New Business Models Increase Productivity Increase Agility Attract and Retain Talent Simplify Operations Speed Time to Market Mitigate Risks I Can Use iPads on My Network Tactical Approach Strategic Approach End User Business IT
  • 100. Shifting the Conversation: Whether to HOW Applications Team: ā€¢ Which applications should I make available on any device? ā€¢ How do I optimize the performance and delivery of applications? Network Engineers: ā€¢ How do I troubleshoot wireless access problems? ā€¢ How do I separate device issues from network and policy issues? ā€¢ How do I ensure user experience? Security Operations: ā€¢ How do I protect my network and data assets from unauthorized access, malware, DLP, device loss/theft? ā€¢ How do I implement multiple security policies per user, device, etc.? Compliance Operations: ā€¢ How do I ensure corporate legal compliance (SOX, HIPAA, PCI, etc.)? Network Operations: ā€¢ What devices are on my networks? ā€¢ Which users are using what devices? What apps are being accessed? ā€¢ What are the real-time app performance metrics? Business & Technical Framework: ā€¢ What are Business drivers for BYOD? ā€¢ How does IT positively impact business goals?
  • 101. Translating Complex Into Manageable BYOD Service Kit
  • 102. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 ā€¢ Will navigate through the complexities of your BYOD requirements ā€¢ Will create a secure and practical roadmap for deployment ā€¢ Will use proven industry relevant best practices and methodologies ā€¢ Will provide a full scope of services to support an accelerated deployment form strategy to pre-production deployment Moving into Howā€”Accelerating Deployment Cisco Architects
  • 103. Cisco BYOD Service Kit Accelerate BYOD deployment ā€“ from strategy to pre-production Gather business and IT imperatives Create High Level future state architecture and use cases Develop Strategy and Roadmap document Assess current state environment (LAN, WLAN, Security) Develop recommendations based on Cisco best practices Create BYOD Architecture Assessment report Develop BYOD solution design with potential risks identified LAN, WLAN, ISE, CPI integration design guidance and recommendation Create BYOD Architecture Design document Deploy solution in pre- production environment Validate use cases in scope As-built solution knowledge transfer BYOD Service Kit
  • 104. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Strategy and Roadmap Align the network architecture BYOD strategy with business goals and integrating requirements that address security, compliance risks, user experience, interoperability and integration ā€¢ High-level evaluation, capture the Customer's BYOD business imperatives, technology requirements, use cases and implications ā€¢ Capture the current state of the network, including key capabilities, governance/ compliance and business drivers ā€¢ Review current infrastructure, security, WLAN & management requirements against Cisco Best Practices ā€¢ BYOD Strategy and Roadmap Document ā€¢ BYOD Customer Requirements Document
  • 105. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Assessment Evaluate the current network against identified requirements to provide recommendations for adoption of future state BYOD architecture ā€¢ Assess technical controls and architecture of existing access network, wireless and security infrastructure vis-a-vis BYOD ā€¢ Assess the current security and risk management programs and its ability to support the future state requirements ā€¢ Identify strengths, weaknesses, gaps and recommendations against Cisco best practice BYOD solution ā€¢ BYOD Architecture Assessment Report, including KPIs, metric dashboard ā€¢ Recommendations for adoption of future state BYOD architecture ā€¢ Updated Customer Requirements Document, if applicable
  • 106. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Foundational Design Develop a BYOD architecture design for up to 3 use cases, mapping business objectives to technical requirements for use in pre-production deployment. ā€¢ Define design recommendation, including proposed network topology, resiliency, availability, scalability, interoperability ā€¢ Guidance on WLAN & ISE integration, including impact to LAN infrastructure ā€¢ Identify and document key risks in the proposed design ā€¢ BYOD Architecture Design Document ā€¢ Configuration for WLAN controller, Cisco Prime (WLAN), access point & ISE
  • 107. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Objective Activities Deliverables Pre-Production Deployment Validate the Cisco BYOD solution design for up to 3 use cases through a pre- production deployment ā€¢ Provide WLAN, Cisco Prime (WLAN), ISE & AP configuration according to BYOD Design ā€¢ Develop BYOD solution test cases, procedures and success criteria ā€¢ Conduct as-built BYOD solution knowledge transfer ā€¢ BYOD solution configuration (WLAN, ISE, Cisco Prime (WLAN), AP) ā€¢ Validate BYOD solution and use case test results against success criteria ā€¢ Conduct as-built BYOD solution knowledge transfer
  • 108. Ā© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108 Please Complete Your Session Evaluation!