Mobilize Employees with the Cisco Mobile Workspace Solution
|
|
|
- Conrad Simon
- 10 years ago
- Views:
Transcription
1 Mobilize Employees with the Cisco Mobile Workspace Solution Mike Jessup, Engineering Tech Lead, Systems Development Unit, Cisco Systems Marcelo Brosig, Solution Architect, Americas Strategic Alliances, Citrix Systems John Monaghan, Consulting Systems Engr., EMEAR Enterprise Networking, Cisco Systems June
2 What is a Mobile Workspace? MOBILE DEVICES MOBILE APPLICATIONS MOBILE EXPEREINCES Native Virtual HTML5 SAAS Voice Video A mobile workspace provides consistent, seamless and secure mobile access to applications, content and communications on any user or corporate device, anywhere. Security Infrastructure OFFICE MOBILE TELE COMPLETE END-TO-END MOBILITY SOLUTION INFRASTRUCTURE AND MOBILE APP EXCELLENCE SIMPLIFIED DEPLOYMENT AND SUPPORT LINKED INFRASTRUCTURE AND MOBILE APP POLICY
3 Customer Challenges with BYOD and Mobility WiFi Growth and Reliability Number of devices, % Y/Y growth Mobile applications driving higher bandwidth requirements ac (and LTE) Ubiquitous wired-like service expectation BYOD is just a subset CYOD Choose Your Own Device, corporate assets Ownership is less important, its about managing/securing data Data Loss Prevention Strategy Compliance with industry/government regulations (HIPAA, PCI, S-Ox, etc.) Balancing Security with User Experience Sources: *Accenture CIO 2013 Survey ** Gartner Research *** IDC Research **** Nemertes 2013 Application Support How to provide access to Legacy applications (Windows, Office, others)? App and Desktop Virtualization shifting to Mobile use cases Mobile App Lifecycle including Portability, Development Costs Complexity and Confusion of Solutions in the Market Should I use an MDM? Which one? How do I secure it? Which security technologies? How will HTML5 affect my strategy? Cloud vs On-premise? Cisco Confidential 3
4 Simplified integrated solution customers do not have to select/integrate many technologies Cisco Mobile Workspace with Citrix Solution Differentiators Modular building-block approach provides insertion for different buying centers: network, security, desktop, mobility, application Seamless zero touch BYOD onboarding (ISE and XenMobile integration) Mobile data protection for security/compliance for Healthcare, Finance, Retail, etc. Flexible support for all application delivery models (native, virtual, HTML5, SaaS, collaboration) Improved Mobile User Experience (Cisco WLAN prioritizes Citrix protocol/traffic) Validated designs mitigate deployment risk with proven reference architectures Cisco Confidential 4
5 The Mobile Workspace Solution Components Architecture and Components BYOD Solution Components Desktop Virtualization Solution Components Mobile Workspace Solution Components Any Device Mobile Collaboration Unified Comms, Jabber, WebEx Unified App Store XenMobile, Storefront Network Policy Control ISE, AnyConnect Mobile Productivity Application Delivery Mobile Policy Mobile Data Security Worx Mobile Apps, ShareFile, Receiver App/Desktop Virtualization XenApp, XenDesktop Mobile Device Management XenMobile Applications and Content Mobile Networking Unified Access, Secure Access Core Infrastructure + Security Cloud Infrastructure Unified Data Center, Security Services Cisco Confidential 5
6 Cisco Mobile Workspace Solution With Citrix: Benefits Best for BUSINESS Best for IT Best for END USERS SIMPLE Single architecture accelerates, enabling mobile workstyles, apps Integrated modular, validated solution for faster risk-free deployments Easy, seamless mobile device on-boarding and app experience SECURE Protecting access, data, and applications for maximum risk mitigation Centralized, multilayer policy management, and enforcement: users, access, devices, data, apps Worry-free secure access for any app on any device, anywhere SMART Flexible architecture to support broad set of use cases and workstyles Built on scalable, intelligent Cisco Unified Access, and HDX for great mobile user experience Choice and flexibility to roam between devices, networks, locations Complete Best-in-Class B2E Mobile Solutions and Services
7 Mobile Workspace Solution Demo John Monaghan, Consulting Systems Engr. EMEAR Enterprise Networking Cisco Confidential 7
8 Core Infrastructure and Security Cisco Confidential 8
9 Cisco Mobile Workspace with Citrix Starts with Unified Access / BYOD Foundation Secure network access anywhere, anytime AAA Services provided by Cisco Identity Services Engine. Authentication with PKI, AD, and OTP (RSA) Role based assignment with access restrictions Access Control Lists TrustSec Security Group Tags. ISE MDM integration for mobile device policy. Cisco Confidential 9
10 Cisco High Density Experience Technology Enabling the Mobile Workspace Performance, Mitigation, Scalability and Roaming Optimized for High Client Density WiFi Networks CleanAir 80 MHz Optimal performance for high throughput, high density environments RF interference detection & mitigation optimized for ac s wider channel bandwidths. ClientLink 3.0 Increase performance & range by up to 60% Cisco patented implicit beamforming technology for ac clients, complementing Explicit BF. Also extend capabilities to a/g/n clients. RF Noise Reduction Enables higher density AP deployments to support client density and increased bandwidth Increase spectrum usage efficiency to improve co-channel performance RF Turbo Performance Support highly dense clients without performance degradation Scale seamlessly to ac clients using interactive video & multimedia traffic. Smart Roam Intelligently assist client roaming Right size WiFi cell to better assist client handoff in a dense network. Cisco Confidential 10
11 Mobile Traffic and the need for QoS Intelligently Managing Mobile Traffic Assuring voice quality from wireless applications meets enterprise VoIP requirements Ensuring video applications are delivered to/from wireless devices with a high Quality of Experience Provisioning preferred services for business-critical applications running on wireless devices De-prioritizing "background" business application traffic Identifying and de-prioritizing (or dropping) non-business applications Cisco Confidential 11
12 Cisco Application Visibility and Control for WLCs Provides Deep-Packet Inspection (DPI) capabilities Identifies applications via Layer 7 stateful signatures Leverages the IOS Network-Based Application Recognition (NBAR2) Engine Over 1000 applications Available on Cisco Wireless Controllers, Routers, and Switches Introduced for WLANs in AireOS 7.4 AireOS 7.6 added Protocol Pack support Application signatures can be added to the engine without requiring a system-software update Cisco Confidential 12
13 BYOD - Cisco Validated Designs v2.5 v2.6 v2.7 Aug 2013 q Security and Policy 3rd Party MDM Integration ISE Logical Profiles Personal/Corporate devices TrustSec/SGA Enforcement q UA/Mobility Infrastructure Converged Access q User Experience App Visibility & Control (AVC) Bonjour Application Gateway Mar 2014 June 2014 q Security and Policy TrustSec for Converged Access IOS XE 3.3.2SE q Location Awareness Cisco Mobility Services Engine q Converged Access Wireless QoS, AVC q Updated Hardware/SW ac via 3600 AP CUWN release 7.6 ISE 1.2 Patch 6 q Mobile and Remote Access for Jabber q FQDN q Scalability Testing enterprise/data-center-designs-cloud-computing/ own_device.html#~overview Cisco Confidential 13
14 Mobile Policy Cisco Confidential 14
15 Cisco Identity Services Engine (ISE) All-in-One Enterprise Policy Control Who What Where When How Identity Context Security Policy Attributes Business-Relevant Policies Wired Wireless VPN VM client, IP device, guest, employee, remote user Cisco Confidential 15
16 BYOD Use Cases BASIC/GUEST LIMITED ENHANCED ADVANCED Focus on Basic Services, Guest Access Environments with Tight Controls Differentiated Services, On-Boarding Securely Posture from Mobile Device Management Broader Device Types Internet Only Only Corporate Devices IT Whitelist Personal Devices Deny Some Devices Any Device, Any Ownership MDM Compliance Cisco Confidential 16
17 ISE and MDM Integration Better together ISE has limited awareness of device posture. E.g. ISE can t detect if PIN-lock is enabled, the device has been jailbroken/rooted,etc. While Mobile Device Managers (MDM) provide posture information, their capacity to enforce network policies is limited With the REST API Integration, ISE 1.2 is able to : Receive device compliance information from the MDM in order to make network access policy decisions Push administrative device actions (such as remote-wiping) via the MDM Cisco Confidential 17
18 ISE and MDM Integration Critical Foundation for Mobile Workspace Enrollment: ISE-orchestrated to simplify user experience Non registered clients redirected to MDM registration page Non compliant clients will be given restricted access ISE 1.2 Daily Access: network+device Update data from endpoint which can be tied into access policy De-enrollment: Ability to Initiate Device Action from ISE Device stolen è need to wipe data on client Cisco Confidential 18
19 MDM Policy Compliance Dictionary Attributes Is the device compliant with MDM policy? Has the device registered with MDM? Has the device been jail-broken/ rooted? Is PIN-lock enabled? Cisco Confidential 19
20 Application Delivery Cisco Confidential 20
21 It s All About the Apps Key capabilities are currently extended to Smartphones more than Tablets % 66% 50% 47% 37% 47% 32% 32% 35% 27% 14% 20% / Calendar Collaborations Apps Productivity Apps Custom Business Apps UC/ IP Telephony/ VoIP Virtualized Desktops FUTURE Key capabilities will be extended to Tablets more than Smartphones in the future and device form will influence the types of apps and resources extended 96% 96% 86% 91% 83% 92% 82% 89% 84% 87% 75% 86% / Calendar Collaborations Apps Productivity Apps Custom Business Apps UC/ IP Telephony/ VoIP Virtualized Desktops Source: Cisco Strategic Marketing Organization/2014 Mobility Landscape Survey 1000 large and mid-sized companies Cisco Confidential 21
22 Unified App Store XenMobile AppController and WorxStore delivers secure access to mobile and native Windows Apps to Mobile Devices Unified Application Store offering Integrated with XenDesktop StoreFront Native & Enterprise Mobile Apps Web and SaaS apps Seamless delivery of Windows apps WorxHome client for secure access to corporate applications Apps launched from within WorxHome requiring user authentication Optional application containerization Apps and data easily wiped in event device is lost or stolen. Cisco Confidential 22
23 Desktop Virtualization Mobile worker must be able to access corporate apps from any device XenDesktop providing access to Windows apps on mobile devices Native, in-house, mobile application development may be delayed or impractical and hence access to Windows app must be made available. XenDesktop and Receiver improves mobile user experience Incorporates integrated optimizations for mobile devices Use of mobile device controls Automatic keyboard display in editable field Touch-optimized desktop SDK available for developing Window apps with capabilities and behaviors typical of a mobile device. Button usage definition Screen orientation On-screen keyboard activation Access device s telephone, SMS, and camera Local interface controls instead of Windows Cisco Confidential 23
24 Before Cisco Confidential 24
25 After Cisco Confidential 25
26 Mobilizing Windows Apps High Definition Experience (HDX) Mobile Translates keyboard / mouse tasks to a touch environment Edit box Keyboard Pop-up Combo Box Picker Pop-up Cisco Confidential 26
27 Mobile SDK for Windows Apps HDX Mobile: Autosense and refactors hosted apps Optimized for screen resolution and orientation Cisco Confidential 27
28 Mobile SDK for Windows Apps HDX Mobile: Local device features translated for virtual apps Citrix Mobility Pack permits: GPS data access Camera access Cisco Confidential 28
29 Mobile Productivity Cisco Confidential 29
30 Cisco Mobile Workspace Solution for Mobile Workers Have secure remote access to corporate network Have access to corporate Unified Communications and reachable via corporate number or messaging anywhere Have ability to attend meetings via web with rich, collaborative, capabilities. Have access to corporate apps regardless of device they are using Have access to work files anywhere without having to download everything to the device. Cisco Confidential 30
31 Remote Access and Cisco AnyConnect Mobile worker must have secure, consistent access anywhere Cisco AnyConnect Secure Mobility Client IPsec/SSL full-tunnel VPN client Always-on connectivity & superior user experience Posture for desktops and mobile Broad desktop and mobile OS platform support Pushed transparently by XenMobile Device Mgr along with connection profile to mobile devices. Clientless SSL VPN Portal on the ASA Granular access control Users presented with defined resources Secure vault Virtual desktop access for Citrix Receiver as ICA Proxy Broad browser and application support Cisco Confidential 31
32 Unified Communications and Collaboration Mobile workers must be able to work anywhere with anyone on any device... Upon MDM registration, XenMobile Device Manager and AppController redirect clients to download Cisco Jabber Client and Webex. Jabber communications to Cisco UC, IM, and Video services enabled while on or off Campus. AnyConnect not required while remote through use of Cisco Expressway Seamless interoperability with AnyConnect when deploying Expressway at the Edge AVC on WLC classifies voice and video traffic QoS on Cisco wireless controllers enables a great overall user expoerience Cisco Confidential 32
33 Desktop Virtualization Mobile workers must be able to securely access Windows apps and associated data from any device XenDesktop delivers Secure access to corporate applications Provides a consistent and secure virtual workspace for contractors and employees with personal devices. Allows for role-specific access to applications based on user credentials Data securely stored in the data center. Desktop and user preferences customizable by Citrix Policies as well as Microsoft GPO. Cisco Confidential 33
34 Secure File Sharing and Storage Mobile workers must be able to access and share files securely anywhere Access, share and sync files from any device Apps for mobile devices Sync for Windows and Mac for laptops and MacBooks Mobile-optimized ShareFile web site Data stored in cloud or locally in StorageZone Local data stored in NAS, CIFS Shares, & SharePoint AD integration incorporating SAML authentication Built-in mobile editor for rich content editing on-the-go PDF annotation SaaS Control Plane Data Plane Cisco Confidential 34
35 Mobile Workspace Solution with Citrix 1.0 CVD Overview Cisco Confidential 35
36 Cisco ISE integrated with Citrix XenMobile Device Manager and AppController Device & App Management Cisco Identity Services Engine 1.2 Policy management for device on-boarding and network access for wired or wireless device while on network. RADIUS AuthC/AuthZ for remote access VPN. EM-BYOD v2.6 policies used as foundation. Policy enforced through ACLs and TrustSec (SGT) Integrated With XenMobile Device Manager for visibility into mobile device policy compliance; quarantined if noncompliant. Cisco UCS Servers Providing Microsoft AD, DNS/DHCP, and CA services Supporting all Citrix infrastructure and built on VMware ESXi 5.1 Scaling guidance provided in Desktop Virtualization Solutions with Citrix CVD Cisco ASA Edge Firewall & VPN Edition Providing Remote access to Network. AnyConnect Client used for access to corporate applications and Citrix infrastructure. Clientless (WebVPN) access for case where ONLY access to XenDesktop is required. Cisco Confidential 36
37 ASA VPN Remote Access AnyConnect SSL or IPsec Remote Users Remote Users ASA-Out ASA-Out XM-MDM ASA-In & SSLVPN Clientless WebVPN ASA-In & SSLVPN I-Edge 6500 I-Edge 6500 Core 6500 Core 6500 Data Center Nexus 7000 Data Center Nexus 7000 Cisco UCS AD Mail ISE CA Cisco UCS StoreFront 2.1 XenDesktop 7.0 XenMobile 2.10 App Cntl Cisco UCS AD Mail ISE CA Cisco UCS StoreFront 2.1 XenDesktop 7.0 AnyConnect Client AC Client required on device Access to AppC Mobile apps via Worx and XenDesk HSD via Receiver after AC launched. Clientless WebVPN AC Client not required. Only access to XenDesk HSD Receiver clientless WebVPN access to XenDesk HSD. Cisco Confidential 37
38 Cisco ISE integrated with Citrix XenMobile Device Manager and AppController Mobile Device & App Mgmnt Citrix XenMobile Device Manager 8.7 Role-based restrictions of mobile device features; i.e. password/pin lock, Camera, applications, clipboard, etc. Role-based deployment packages with policies and apps such as Cisco AnyConnect Client, AC Profile, Jabber and Webex. MDM serves as SCEP Proxy for certifcates required for MDM and AnyConnect Client. Users can register with MDM either on or off network. Integrated with XenMobile App Controller. Citrix XenMobile App Controller Provides Unified App Store with Citrix Receiver and ShareFile as well as other mobile applications. Reciever configuration profile pushed transparently to mobile device based on user s AD credentials. Provides support for the WorxHome client from which apps can be securely launched using AD credentials. Citrix XenMobile App Controller Cont d Supports selective wipe of corporate applications launched from within WorxHome. Provide SAML Federation Services required for ShareFile AD integration. Integrated with XenDesktop StoreFront. Cisco Confidential 38
39 Citrix XenDesktop 7 Application and Desktop Virtualization Citrix XenDesktop 7 XenDesktop Server OS Machine Catalogs providing Hosted Shared Desktops based on Server 2008 R2. Implement StoreFront to provide access to XenDesktop HSD and Windows applications. Hosted Shared Desktops enumerated by Machine Creation Services Fills requirement for shared desktop addressing tablet and laptop users without intensive graphic or computing requirements. Machine Catalogs and Delivery Groups dedicated for each user role. Desktops customized for specific user roles based on Active Directory credentials. ShareFile Sync for Windows available on shared desktops Cisco Confidential 39
40 Citrix ShareFile Mobile Information Management Citrix ShareFile Providing enterprise-grade file sharing Split control and data plane Control plane resident in Citrix cloud User authentication Resource List; ie files, folders Files can be stored in cloud storage or in a local StorageZone for regulatory compliance of sensitive files. NAS, CIFS, Sharepoint support. Ubiquitous access regardless of device as a mobile app, Outlook plug-in, and Sync app for Windows and MacOS. AD-SSO via SAML services deployed on XenMobile App Controller. Sync for Windows deployed on XenDesktop HSD Cisco Confidential 40
41 The Mobile Workspace Solution Components In Summary CMWS 1.0 CVD - BYOD 2.6 CVD - Desktop Virtualization CVD - Cisco Confidential 41
42 Q & A
43 Thank you.
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Bring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG ([email protected]) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
Productive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Move beyond BYOD to Mobile Workspace with Cisco and Citrix
Move beyond BYOD to Mobile Workspace with Cisco and Citrix Delivering the Complete Mobile Experience Citrix Synergy 2014 May 2014 In Collaboration with Intel Evolving From Device Mobility to Workspace
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
Secure mobility with Citrix & Cisco
Secure mobility with Citrix & Cisco Enterprise IT resources on tablets and smartphones BYOD & Mobile Networks Damjan Mirtic Citrix South East Europe 1.3 Billion Mobile workers by 2015 Mobile Worker Population
Cisco Adaptive Security Appliances and Citrix NetScaler Gateway citrix.com
Cisco Adaptive Security Appliances and NetScaler Gateway 2 Contents What You Will Learn...3 Cisco ASA SSL VPN...4 NetScaler Gateway...5 HDX SmartAccess...6 HDX Insight...6 Combining Cisco ASA and NetScaler
Cisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
Cisco and Citrix for Productive and Secure Enterprise Mobility citrix.com
Cisco and Citrix for Productive and Secure Enterprise Mobility 2 Contents Introduction...3 Mobile Infrastructure Opportunities and Challenges...4 A Compelling Productivity Imperative...4 New Challenges
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN
Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
Cisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
BYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Secure Enterprise Mobility Management The system integrator point of view. www.unisystems.com
Secure Enterprise Mobility Management The system integrator point of view www.unisystems.com 1 Mobility is Top of Mind Mobility Is Top of Mind 50% of Companies Have Adopted Companywide Mobility Strategy*
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Citrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) [email protected] Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Meraki: Introduction to Cloud Networking
Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview
Citrix Update Webinar
Citrix Update Webinar André Stutz, BCD-SINTRAG AG 2015 Citrix & BCD-SINTRAG AG 2 2015 Citrix & BCD-SINTRAG AG We XenApp Studio Director Automated workload provisioning Automatic app publishing Custom delegated
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs
CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
VMware End User Computing Horizon Suite
VMware End User Computing Horizon Suite Luc Gallet [email protected] 2010 VMware Inc. All rights reserved The pace and rate of technology change is faster than ever Devices 66 % use 2+ devices for work
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Enabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
Systems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
Cisco WAAS Optimized for Citrix XenDesktop
White Paper Cisco WAAS Optimized for Citrix XenDesktop Cisco Wide Area Application Services (WAAS) provides high performance delivery of Citrix XenDesktop and Citrix XenApp over the WAN. What ou Will Learn
Comprehensive Enterprise Mobile Management for ios 8
Comprehensive Enterprise Mobile Management for ios 8 Citrix XenMobile enhances the new iphone and ipad operating system to give mobile users increased functionality and enterprises greater management and
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
Citrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
ShareFile Enterprise for healthcare
for healthcare Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support regulatory compliance and mobilize data access with Citrix.
Simple, scalable and secure unified wired and wireless networking
Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: [email protected] Copyright 2012 Hewlett-Packard
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Enterprise Mobility Empowered by Logicalis / Cisco / Citrix
1 The vitality of your business depends on enterprise mobility. The way we work has changed. So has the way your workers work. Mobile technology now touches almost every aspect of our daily lives. From
Secure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service
BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,
ShareFile Enterprise technical overview
Overview Guide ShareFile Enterprise technical overview Secure data sync and sharing services ShareFile empowers users to securely share files with anyone and to sync files across all of their devices The
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
How Cisco IT Built Virtual Desktop Infrastructure
Cisco IT Case Study May 2012 Virtualization Desktop Infrastructure (VDI) How Cisco IT Built Virtual Desktop Infrastructure Cisco Virtualization Experience Infrastructure (VXI) is core pillar of Cisco strategy
Deliver Secure and Accelerated Remote Access to Applications
DATASHEET What s Inside: 1 Key Benefits 2 Scalability to Meet Future IT Demands 2 Streamlined Access Management 5 Improved User Experience and Productivity 6 Superior Security 6 Accelerated Application
BYOD Networks for Kommuner
BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
MDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
NX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD
CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD CONTROL YOUR ENTIRE NETWORK WITH A SINGLE, CENTRALIZED COMMAND CENTER Are you prepared to manage
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Anders Keis Hansen. Solution Architect Commaxx Danmark
Anders Keis Hansen Solution Architect Commaxx Danmark 2012 Citrix #CitrixSynergy Orchestrates and optimizes delivery of all SaaS, Web and Windows apps 50% work from home 43% work from client sites 40%
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with
Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01
Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:
300-208 - Implementing Cisco Secure AccessSolutions Exam
Implementing Cisco Secure Access Solutions Duration: 5 Days Course Code: SISAS Overview: This course has been designed to provide engineers with the foundational knowledge and skills required to implement
Safeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
Citrix XenMobile technology overview
Citrix XenMobile technology overview 2 The bring your own (BYO) device movement, the proliferation of smartphones in the workplace, and enterprise tablet initiatives have made mobility a top priority among
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Cisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 7, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems Development
Cisco Validated Design
Device Freedom Without Compromising the IT Network Last Updated: February 20, 2012 2 Cisco Validated Design About the Authors About the Authors Neil Anderson, Director of Systems Architecture, Systems
