Mobilize Employees with the Cisco Mobile Workspace Solution

Size: px
Start display at page:

Download "Mobilize Employees with the Cisco Mobile Workspace Solution"

Transcription

1 Mobilize Employees with the Cisco Mobile Workspace Solution Mike Jessup, Engineering Tech Lead, Systems Development Unit, Cisco Systems Marcelo Brosig, Solution Architect, Americas Strategic Alliances, Citrix Systems John Monaghan, Consulting Systems Engr., EMEAR Enterprise Networking, Cisco Systems June

2 What is a Mobile Workspace? MOBILE DEVICES MOBILE APPLICATIONS MOBILE EXPEREINCES Native Virtual HTML5 SAAS Voice Video A mobile workspace provides consistent, seamless and secure mobile access to applications, content and communications on any user or corporate device, anywhere. Security Infrastructure OFFICE MOBILE TELE COMPLETE END-TO-END MOBILITY SOLUTION INFRASTRUCTURE AND MOBILE APP EXCELLENCE SIMPLIFIED DEPLOYMENT AND SUPPORT LINKED INFRASTRUCTURE AND MOBILE APP POLICY

3 Customer Challenges with BYOD and Mobility WiFi Growth and Reliability Number of devices, % Y/Y growth Mobile applications driving higher bandwidth requirements ac (and LTE) Ubiquitous wired-like service expectation BYOD is just a subset CYOD Choose Your Own Device, corporate assets Ownership is less important, its about managing/securing data Data Loss Prevention Strategy Compliance with industry/government regulations (HIPAA, PCI, S-Ox, etc.) Balancing Security with User Experience Sources: *Accenture CIO 2013 Survey ** Gartner Research *** IDC Research **** Nemertes 2013 Application Support How to provide access to Legacy applications (Windows, Office, others)? App and Desktop Virtualization shifting to Mobile use cases Mobile App Lifecycle including Portability, Development Costs Complexity and Confusion of Solutions in the Market Should I use an MDM? Which one? How do I secure it? Which security technologies? How will HTML5 affect my strategy? Cloud vs On-premise? Cisco Confidential 3

4 Simplified integrated solution customers do not have to select/integrate many technologies Cisco Mobile Workspace with Citrix Solution Differentiators Modular building-block approach provides insertion for different buying centers: network, security, desktop, mobility, application Seamless zero touch BYOD onboarding (ISE and XenMobile integration) Mobile data protection for security/compliance for Healthcare, Finance, Retail, etc. Flexible support for all application delivery models (native, virtual, HTML5, SaaS, collaboration) Improved Mobile User Experience (Cisco WLAN prioritizes Citrix protocol/traffic) Validated designs mitigate deployment risk with proven reference architectures Cisco Confidential 4

5 The Mobile Workspace Solution Components Architecture and Components BYOD Solution Components Desktop Virtualization Solution Components Mobile Workspace Solution Components Any Device Mobile Collaboration Unified Comms, Jabber, WebEx Unified App Store XenMobile, Storefront Network Policy Control ISE, AnyConnect Mobile Productivity Application Delivery Mobile Policy Mobile Data Security Worx Mobile Apps, ShareFile, Receiver App/Desktop Virtualization XenApp, XenDesktop Mobile Device Management XenMobile Applications and Content Mobile Networking Unified Access, Secure Access Core Infrastructure + Security Cloud Infrastructure Unified Data Center, Security Services Cisco Confidential 5

6 Cisco Mobile Workspace Solution With Citrix: Benefits Best for BUSINESS Best for IT Best for END USERS SIMPLE Single architecture accelerates, enabling mobile workstyles, apps Integrated modular, validated solution for faster risk-free deployments Easy, seamless mobile device on-boarding and app experience SECURE Protecting access, data, and applications for maximum risk mitigation Centralized, multilayer policy management, and enforcement: users, access, devices, data, apps Worry-free secure access for any app on any device, anywhere SMART Flexible architecture to support broad set of use cases and workstyles Built on scalable, intelligent Cisco Unified Access, and HDX for great mobile user experience Choice and flexibility to roam between devices, networks, locations Complete Best-in-Class B2E Mobile Solutions and Services

7 Mobile Workspace Solution Demo John Monaghan, Consulting Systems Engr. EMEAR Enterprise Networking Cisco Confidential 7

8 Core Infrastructure and Security Cisco Confidential 8

9 Cisco Mobile Workspace with Citrix Starts with Unified Access / BYOD Foundation Secure network access anywhere, anytime AAA Services provided by Cisco Identity Services Engine. Authentication with PKI, AD, and OTP (RSA) Role based assignment with access restrictions Access Control Lists TrustSec Security Group Tags. ISE MDM integration for mobile device policy. Cisco Confidential 9

10 Cisco High Density Experience Technology Enabling the Mobile Workspace Performance, Mitigation, Scalability and Roaming Optimized for High Client Density WiFi Networks CleanAir 80 MHz Optimal performance for high throughput, high density environments RF interference detection & mitigation optimized for ac s wider channel bandwidths. ClientLink 3.0 Increase performance & range by up to 60% Cisco patented implicit beamforming technology for ac clients, complementing Explicit BF. Also extend capabilities to a/g/n clients. RF Noise Reduction Enables higher density AP deployments to support client density and increased bandwidth Increase spectrum usage efficiency to improve co-channel performance RF Turbo Performance Support highly dense clients without performance degradation Scale seamlessly to ac clients using interactive video & multimedia traffic. Smart Roam Intelligently assist client roaming Right size WiFi cell to better assist client handoff in a dense network. Cisco Confidential 10

11 Mobile Traffic and the need for QoS Intelligently Managing Mobile Traffic Assuring voice quality from wireless applications meets enterprise VoIP requirements Ensuring video applications are delivered to/from wireless devices with a high Quality of Experience Provisioning preferred services for business-critical applications running on wireless devices De-prioritizing "background" business application traffic Identifying and de-prioritizing (or dropping) non-business applications Cisco Confidential 11

12 Cisco Application Visibility and Control for WLCs Provides Deep-Packet Inspection (DPI) capabilities Identifies applications via Layer 7 stateful signatures Leverages the IOS Network-Based Application Recognition (NBAR2) Engine Over 1000 applications Available on Cisco Wireless Controllers, Routers, and Switches Introduced for WLANs in AireOS 7.4 AireOS 7.6 added Protocol Pack support Application signatures can be added to the engine without requiring a system-software update Cisco Confidential 12

13 BYOD - Cisco Validated Designs v2.5 v2.6 v2.7 Aug 2013 q Security and Policy 3rd Party MDM Integration ISE Logical Profiles Personal/Corporate devices TrustSec/SGA Enforcement q UA/Mobility Infrastructure Converged Access q User Experience App Visibility & Control (AVC) Bonjour Application Gateway Mar 2014 June 2014 q Security and Policy TrustSec for Converged Access IOS XE 3.3.2SE q Location Awareness Cisco Mobility Services Engine q Converged Access Wireless QoS, AVC q Updated Hardware/SW ac via 3600 AP CUWN release 7.6 ISE 1.2 Patch 6 q Mobile and Remote Access for Jabber q FQDN q Scalability Testing enterprise/data-center-designs-cloud-computing/ own_device.html#~overview Cisco Confidential 13

14 Mobile Policy Cisco Confidential 14

15 Cisco Identity Services Engine (ISE) All-in-One Enterprise Policy Control Who What Where When How Identity Context Security Policy Attributes Business-Relevant Policies Wired Wireless VPN VM client, IP device, guest, employee, remote user Cisco Confidential 15

16 BYOD Use Cases BASIC/GUEST LIMITED ENHANCED ADVANCED Focus on Basic Services, Guest Access Environments with Tight Controls Differentiated Services, On-Boarding Securely Posture from Mobile Device Management Broader Device Types Internet Only Only Corporate Devices IT Whitelist Personal Devices Deny Some Devices Any Device, Any Ownership MDM Compliance Cisco Confidential 16

17 ISE and MDM Integration Better together ISE has limited awareness of device posture. E.g. ISE can t detect if PIN-lock is enabled, the device has been jailbroken/rooted,etc. While Mobile Device Managers (MDM) provide posture information, their capacity to enforce network policies is limited With the REST API Integration, ISE 1.2 is able to : Receive device compliance information from the MDM in order to make network access policy decisions Push administrative device actions (such as remote-wiping) via the MDM Cisco Confidential 17

18 ISE and MDM Integration Critical Foundation for Mobile Workspace Enrollment: ISE-orchestrated to simplify user experience Non registered clients redirected to MDM registration page Non compliant clients will be given restricted access ISE 1.2 Daily Access: network+device Update data from endpoint which can be tied into access policy De-enrollment: Ability to Initiate Device Action from ISE Device stolen è need to wipe data on client Cisco Confidential 18

19 MDM Policy Compliance Dictionary Attributes Is the device compliant with MDM policy? Has the device registered with MDM? Has the device been jail-broken/ rooted? Is PIN-lock enabled? Cisco Confidential 19

20 Application Delivery Cisco Confidential 20

21 It s All About the Apps Key capabilities are currently extended to Smartphones more than Tablets % 66% 50% 47% 37% 47% 32% 32% 35% 27% 14% 20% / Calendar Collaborations Apps Productivity Apps Custom Business Apps UC/ IP Telephony/ VoIP Virtualized Desktops FUTURE Key capabilities will be extended to Tablets more than Smartphones in the future and device form will influence the types of apps and resources extended 96% 96% 86% 91% 83% 92% 82% 89% 84% 87% 75% 86% / Calendar Collaborations Apps Productivity Apps Custom Business Apps UC/ IP Telephony/ VoIP Virtualized Desktops Source: Cisco Strategic Marketing Organization/2014 Mobility Landscape Survey 1000 large and mid-sized companies Cisco Confidential 21

22 Unified App Store XenMobile AppController and WorxStore delivers secure access to mobile and native Windows Apps to Mobile Devices Unified Application Store offering Integrated with XenDesktop StoreFront Native & Enterprise Mobile Apps Web and SaaS apps Seamless delivery of Windows apps WorxHome client for secure access to corporate applications Apps launched from within WorxHome requiring user authentication Optional application containerization Apps and data easily wiped in event device is lost or stolen. Cisco Confidential 22

23 Desktop Virtualization Mobile worker must be able to access corporate apps from any device XenDesktop providing access to Windows apps on mobile devices Native, in-house, mobile application development may be delayed or impractical and hence access to Windows app must be made available. XenDesktop and Receiver improves mobile user experience Incorporates integrated optimizations for mobile devices Use of mobile device controls Automatic keyboard display in editable field Touch-optimized desktop SDK available for developing Window apps with capabilities and behaviors typical of a mobile device. Button usage definition Screen orientation On-screen keyboard activation Access device s telephone, SMS, and camera Local interface controls instead of Windows Cisco Confidential 23

24 Before Cisco Confidential 24

25 After Cisco Confidential 25

26 Mobilizing Windows Apps High Definition Experience (HDX) Mobile Translates keyboard / mouse tasks to a touch environment Edit box Keyboard Pop-up Combo Box Picker Pop-up Cisco Confidential 26

27 Mobile SDK for Windows Apps HDX Mobile: Autosense and refactors hosted apps Optimized for screen resolution and orientation Cisco Confidential 27

28 Mobile SDK for Windows Apps HDX Mobile: Local device features translated for virtual apps Citrix Mobility Pack permits: GPS data access Camera access Cisco Confidential 28

29 Mobile Productivity Cisco Confidential 29

30 Cisco Mobile Workspace Solution for Mobile Workers Have secure remote access to corporate network Have access to corporate Unified Communications and reachable via corporate number or messaging anywhere Have ability to attend meetings via web with rich, collaborative, capabilities. Have access to corporate apps regardless of device they are using Have access to work files anywhere without having to download everything to the device. Cisco Confidential 30

31 Remote Access and Cisco AnyConnect Mobile worker must have secure, consistent access anywhere Cisco AnyConnect Secure Mobility Client IPsec/SSL full-tunnel VPN client Always-on connectivity & superior user experience Posture for desktops and mobile Broad desktop and mobile OS platform support Pushed transparently by XenMobile Device Mgr along with connection profile to mobile devices. Clientless SSL VPN Portal on the ASA Granular access control Users presented with defined resources Secure vault Virtual desktop access for Citrix Receiver as ICA Proxy Broad browser and application support Cisco Confidential 31

32 Unified Communications and Collaboration Mobile workers must be able to work anywhere with anyone on any device... Upon MDM registration, XenMobile Device Manager and AppController redirect clients to download Cisco Jabber Client and Webex. Jabber communications to Cisco UC, IM, and Video services enabled while on or off Campus. AnyConnect not required while remote through use of Cisco Expressway Seamless interoperability with AnyConnect when deploying Expressway at the Edge AVC on WLC classifies voice and video traffic QoS on Cisco wireless controllers enables a great overall user expoerience Cisco Confidential 32

33 Desktop Virtualization Mobile workers must be able to securely access Windows apps and associated data from any device XenDesktop delivers Secure access to corporate applications Provides a consistent and secure virtual workspace for contractors and employees with personal devices. Allows for role-specific access to applications based on user credentials Data securely stored in the data center. Desktop and user preferences customizable by Citrix Policies as well as Microsoft GPO. Cisco Confidential 33

34 Secure File Sharing and Storage Mobile workers must be able to access and share files securely anywhere Access, share and sync files from any device Apps for mobile devices Sync for Windows and Mac for laptops and MacBooks Mobile-optimized ShareFile web site Data stored in cloud or locally in StorageZone Local data stored in NAS, CIFS Shares, & SharePoint AD integration incorporating SAML authentication Built-in mobile editor for rich content editing on-the-go PDF annotation SaaS Control Plane Data Plane Cisco Confidential 34

35 Mobile Workspace Solution with Citrix 1.0 CVD Overview Cisco Confidential 35

36 Cisco ISE integrated with Citrix XenMobile Device Manager and AppController Device & App Management Cisco Identity Services Engine 1.2 Policy management for device on-boarding and network access for wired or wireless device while on network. RADIUS AuthC/AuthZ for remote access VPN. EM-BYOD v2.6 policies used as foundation. Policy enforced through ACLs and TrustSec (SGT) Integrated With XenMobile Device Manager for visibility into mobile device policy compliance; quarantined if noncompliant. Cisco UCS Servers Providing Microsoft AD, DNS/DHCP, and CA services Supporting all Citrix infrastructure and built on VMware ESXi 5.1 Scaling guidance provided in Desktop Virtualization Solutions with Citrix CVD Cisco ASA Edge Firewall & VPN Edition Providing Remote access to Network. AnyConnect Client used for access to corporate applications and Citrix infrastructure. Clientless (WebVPN) access for case where ONLY access to XenDesktop is required. Cisco Confidential 36

37 ASA VPN Remote Access AnyConnect SSL or IPsec Remote Users Remote Users ASA-Out ASA-Out XM-MDM ASA-In & SSLVPN Clientless WebVPN ASA-In & SSLVPN I-Edge 6500 I-Edge 6500 Core 6500 Core 6500 Data Center Nexus 7000 Data Center Nexus 7000 Cisco UCS AD Mail ISE CA Cisco UCS StoreFront 2.1 XenDesktop 7.0 XenMobile 2.10 App Cntl Cisco UCS AD Mail ISE CA Cisco UCS StoreFront 2.1 XenDesktop 7.0 AnyConnect Client AC Client required on device Access to AppC Mobile apps via Worx and XenDesk HSD via Receiver after AC launched. Clientless WebVPN AC Client not required. Only access to XenDesk HSD Receiver clientless WebVPN access to XenDesk HSD. Cisco Confidential 37

38 Cisco ISE integrated with Citrix XenMobile Device Manager and AppController Mobile Device & App Mgmnt Citrix XenMobile Device Manager 8.7 Role-based restrictions of mobile device features; i.e. password/pin lock, Camera, applications, clipboard, etc. Role-based deployment packages with policies and apps such as Cisco AnyConnect Client, AC Profile, Jabber and Webex. MDM serves as SCEP Proxy for certifcates required for MDM and AnyConnect Client. Users can register with MDM either on or off network. Integrated with XenMobile App Controller. Citrix XenMobile App Controller Provides Unified App Store with Citrix Receiver and ShareFile as well as other mobile applications. Reciever configuration profile pushed transparently to mobile device based on user s AD credentials. Provides support for the WorxHome client from which apps can be securely launched using AD credentials. Citrix XenMobile App Controller Cont d Supports selective wipe of corporate applications launched from within WorxHome. Provide SAML Federation Services required for ShareFile AD integration. Integrated with XenDesktop StoreFront. Cisco Confidential 38

39 Citrix XenDesktop 7 Application and Desktop Virtualization Citrix XenDesktop 7 XenDesktop Server OS Machine Catalogs providing Hosted Shared Desktops based on Server 2008 R2. Implement StoreFront to provide access to XenDesktop HSD and Windows applications. Hosted Shared Desktops enumerated by Machine Creation Services Fills requirement for shared desktop addressing tablet and laptop users without intensive graphic or computing requirements. Machine Catalogs and Delivery Groups dedicated for each user role. Desktops customized for specific user roles based on Active Directory credentials. ShareFile Sync for Windows available on shared desktops Cisco Confidential 39

40 Citrix ShareFile Mobile Information Management Citrix ShareFile Providing enterprise-grade file sharing Split control and data plane Control plane resident in Citrix cloud User authentication Resource List; ie files, folders Files can be stored in cloud storage or in a local StorageZone for regulatory compliance of sensitive files. NAS, CIFS, Sharepoint support. Ubiquitous access regardless of device as a mobile app, Outlook plug-in, and Sync app for Windows and MacOS. AD-SSO via SAML services deployed on XenMobile App Controller. Sync for Windows deployed on XenDesktop HSD Cisco Confidential 40

41 The Mobile Workspace Solution Components In Summary CMWS 1.0 CVD - BYOD 2.6 CVD - Desktop Virtualization CVD - Cisco Confidential 41

42 Q & A

43 Thank you.

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Cisco Values in BYOD Eric NG ([email protected]) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Productive and Secure Enterprise Mobility with Cisco and Citrix

Productive and Secure Enterprise Mobility with Cisco and Citrix Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

Secure Your Mobile Device Access with Cisco BYOD Solutions

Secure Your Mobile Device Access with Cisco BYOD Solutions Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

Move beyond BYOD to Mobile Workspace with Cisco and Citrix

Move beyond BYOD to Mobile Workspace with Cisco and Citrix Move beyond BYOD to Mobile Workspace with Cisco and Citrix Delivering the Complete Mobile Experience Citrix Synergy 2014 May 2014 In Collaboration with Intel Evolving From Device Mobility to Workspace

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security

More information

Secure mobility with Citrix & Cisco

Secure mobility with Citrix & Cisco Secure mobility with Citrix & Cisco Enterprise IT resources on tablets and smartphones BYOD & Mobile Networks Damjan Mirtic Citrix South East Europe 1.3 Billion Mobile workers by 2015 Mobile Worker Population

More information

Cisco Adaptive Security Appliances and Citrix NetScaler Gateway citrix.com

Cisco Adaptive Security Appliances and Citrix NetScaler Gateway citrix.com Cisco Adaptive Security Appliances and NetScaler Gateway 2 Contents What You Will Learn...3 Cisco ASA SSL VPN...4 NetScaler Gateway...5 HDX SmartAccess...6 HDX Insight...6 Combining Cisco ASA and NetScaler

More information

Cisco s BYOD / Mobility

Cisco s BYOD / Mobility Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights

More information

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf

More information

Cisco and Citrix for Productive and Secure Enterprise Mobility citrix.com

Cisco and Citrix for Productive and Secure Enterprise Mobility citrix.com Cisco and Citrix for Productive and Secure Enterprise Mobility 2 Contents Introduction...3 Mobile Infrastructure Opportunities and Challenges...4 A Compelling Productivity Imperative...4 New Challenges

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions

More information

Cisco Unified Access Technology Overview: Converged Access

Cisco Unified Access Technology Overview: Converged Access White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the

More information

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987 BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Secure Enterprise Mobility Management The system integrator point of view. www.unisystems.com

Secure Enterprise Mobility Management The system integrator point of view. www.unisystems.com Secure Enterprise Mobility Management The system integrator point of view www.unisystems.com 1 Mobility is Top of Mind Mobility Is Top of Mind 50% of Companies Have Adopted Companywide Mobility Strategy*

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) [email protected] Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

Empowering Students with Mobility and BYOD Technology

Empowering Students with Mobility and BYOD Technology Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Meraki: Introduction to Cloud Networking

Meraki: Introduction to Cloud Networking Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview

More information

Citrix Update Webinar

Citrix Update Webinar Citrix Update Webinar André Stutz, BCD-SINTRAG AG 2015 Citrix & BCD-SINTRAG AG 2 2015 Citrix & BCD-SINTRAG AG We XenApp Studio Director Automated workload provisioning Automatic app publishing Custom delegated

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency

More information

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Integrating Cisco ISE with GO!Enterprise MDM Quick Start Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise

More information

VMware End User Computing Horizon Suite

VMware End User Computing Horizon Suite VMware End User Computing Horizon Suite Luc Gallet [email protected] 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Enabling mobile workstyles with an end-to-end enterprise mobility management solution.

Enabling mobile workstyles with an end-to-end enterprise mobility management solution. Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Cisco WAAS Optimized for Citrix XenDesktop

Cisco WAAS Optimized for Citrix XenDesktop White Paper Cisco WAAS Optimized for Citrix XenDesktop Cisco Wide Area Application Services (WAAS) provides high performance delivery of Citrix XenDesktop and Citrix XenApp over the WAN. What ou Will Learn

More information

Comprehensive Enterprise Mobile Management for ios 8

Comprehensive Enterprise Mobile Management for ios 8 Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

Preparing your network for the mobile onslaught

Preparing your network for the mobile onslaught IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows

More information

ShareFile Enterprise for healthcare

ShareFile Enterprise for healthcare for healthcare Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support regulatory compliance and mobilize data access with Citrix.

More information

Simple, scalable and secure unified wired and wireless networking

Simple, scalable and secure unified wired and wireless networking Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: [email protected] Copyright 2012 Hewlett-Packard

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Enterprise Mobility Empowered by Logicalis / Cisco / Citrix

Enterprise Mobility Empowered by Logicalis / Cisco / Citrix 1 The vitality of your business depends on enterprise mobility. The way we work has changed. So has the way your workers work. Mobile technology now touches almost every aspect of our daily lives. From

More information

Secure iphone Access to Corporate Web Applications

Secure iphone Access to Corporate Web Applications F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,

More information

ShareFile Enterprise technical overview

ShareFile Enterprise technical overview Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

How Cisco IT Built Virtual Desktop Infrastructure

How Cisco IT Built Virtual Desktop Infrastructure Cisco IT Case Study May 2012 Virtualization Desktop Infrastructure (VDI) How Cisco IT Built Virtual Desktop Infrastructure Cisco Virtualization Experience Infrastructure (VXI) is core pillar of Cisco strategy

More information

Deliver Secure and Accelerated Remote Access to Applications

Deliver Secure and Accelerated Remote Access to Applications DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application

More information

BYOD Networks for Kommuner

BYOD Networks for Kommuner BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

MDM and beyond: Rethinking mobile security in a BYOD world

MDM and beyond: Rethinking mobile security in a BYOD world MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices

More information

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD

NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD CONTROL YOUR ENTIRE NETWORK WITH A SINGLE, CENTRALIZED COMMAND CENTER Are you prepared to manage

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Anders Keis Hansen. Solution Architect Commaxx Danmark

Anders Keis Hansen. Solution Architect Commaxx Danmark Anders Keis Hansen Solution Architect Commaxx Danmark 2012 Citrix #CitrixSynergy Orchestrates and optimizes delivery of all SaaS, Web and Windows apps 50% work from home 43% work from client sites 40%

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org

More information

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral

More information

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with

More information

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the

More information

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:

More information

300-208 - Implementing Cisco Secure AccessSolutions Exam

300-208 - Implementing Cisco Secure AccessSolutions Exam Implementing Cisco Secure Access Solutions Duration: 5 Days Course Code: SISAS Overview: This course has been designed to provide engineers with the foundational knowledge and skills required to implement

More information

Safeguard Protected Health Information With Citrix ShareFile

Safeguard Protected Health Information With Citrix ShareFile Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare

More information

Citrix XenMobile technology overview

Citrix XenMobile technology overview Citrix XenMobile technology overview 2 The bring your own (BYO) device movement, the proliferation of smartphones in the workplace, and enterprise tablet initiatives have made mobility a top priority among

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Cisco Validated Design

Cisco Validated Design Device Freedom Without Compromising the IT Network Last Updated: February 7, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems Development

More information

Cisco Validated Design

Cisco Validated Design Device Freedom Without Compromising the IT Network Last Updated: February 20, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems

More information