Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
|
|
- Ross McGee
- 8 years ago
- Views:
Transcription
1 Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security Cisco Systems 2010 Cisco and/or its affiliates. All rights reserved. 1
2 Basic BYOD Mobility BYOD+Profiling Basic Advanced Beyond BYOD Guest Wi-Fi Corporate Wi-Fi Mobil only Guest Wi-Fi Corporate Wi-Fi Mobil Personal Mobile Device with Profiling Restricted Corporate resource access (HTTPS/ VLAN/ACL) Guest Wi-Fi Corporate Wi-Fi Mobil Personal Mobile Device with Profiling and Provisioning VPN Access Unrestricted Corporate resource access Wired BYOD Voice / Video everywhere VDI / VXI MDM C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3 What s Mobile Device Management Does it solve all your problems???? MDM Solutions Advanced Systems Device inventory Device provisioning and deprovisioning Device data security Device application security User and device authentication Posture assessment Policy enforcement Context-aware access control Threat defense Web use policy Web application DLP Secure remote access Cost management Full or selective device remote wipe Cisco ISE Cisco ScanSafe Cisco WSA Cisco AnyConnect Cisco ASA C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4 Device count per student Type of devices allowed Applications permitted Recommendation to users on devices Managing the devices: Profiling Provisioning Keeping your networks secure Troubleshooting C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
5 Mobile devices are replacing traditional PCs How many devices are being brought in? What do you allow per student? (quantity) Charging of devices- how to keep them alive for school work IP addressing schemes can be an issue C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6 What type of devices should you permit? Smartphones, Tablets, ipods, etc b?- Do you know what it does to your system performance?? Gaming systems? Mini Hotspots (3.4G to Wi-Fi Aps?) How are you going to control? Cameras? YOU need to set the rules upfront on what is and is not allowed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7 All Wi-Fi devices are not created equal!! PCs vary in type, radio characteristics, antennas, overall wireless performance Tablets and smart phones are not the same Not all Apple (insert any company name here) devices work the same. Chrome books??? Channels 165?? Roaming? C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
8 ActiveSync Integration Configure accounts & settings Microsoft Exchange, Gmail, Office 365 etc. Securely push account information (SCEP) User Accounts Owner attribute for clients Bulk CSV upload support for users Owners page for central view / management Profile Management Use profiles for granular controls C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 How do you determine who goes where? Do you have a guest Network? Are students allowed on Guest network? Do you police guest network? Authenticate the guest network? How do you separate teachers and students? Are all devices for a teacher allowed on the teacher network? Remember the 3 R s (and not Readin, Ritein, and Rithmetic!) 1. Right User 2. Right device 3. Right resource C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10 Applications- what to and what not to allow Pandora Netflix Bit Torrent Instant Message C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
11 You need the ability to Identify standard ports, and L7 Deep Packet Inspection BEFORE Application View & Control based on Firewall sessions AFTER Network Based Application Recognition - NBAR2 Deep Packet Inspection and App ID Visibility to the port level interaction but not the applications running within the port First Generation Firewall HTTP = 75% SMTP = 15% FTP = 2% Telnet = 1% SNMP = 3% Traffic NBAR2 LIBRARY Deep Packet inspection Netflix = 50% YouTube = 15% WebEx = 10% Citrix = 9% exchange= 8% POLICY Packet Mark and Drop Netflow v9 export Ability to Classify applications with sub-classification within applications: e.g. Lync desktop share, video/voice, file transfer Apply Granular policies - Per SSID, Device, Campus, Building, Floor, Per user Real-time troubleshooting C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
12 How do you resolve connection issues? Slow response times? Who is responsible to keep the systems up to date? Virus scanner, OS Security breaches, etc. How do you find devices in a sea of devices? C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
13 C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
14 Wired + wireless Client fingerprints Location analytics Application QoS Realtime control C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
15 Troubleshooting items C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16 Troubleshooting tools should include AP side analytics C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
17 C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
18 A Mobile Device Management ensures devices share a common configuration Devices should share the same network configuration, and have a valid authentication profile Geofencing tracks devices that leave the premises, helping to recover stolen devices, and allowing for remote lock and wipe Draw fences around school buildings, and make sure devices don t go home with students! Device profiles allow specific types of devices, or devices used for specific purposes, to have similar configurations All Science ipads should have the Periodic Table of Elements App, all English Windows Laptops should have a Grammar app, All Testing devices should have the same apps (if required) Use a Mobile Device Manager to monitor asset resources (memory, hard drive, etc.) Check remaining space, applications installed, battery life, etc. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
19 Device Lock Down Network Configuration GeoFencing Hardware Information C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
20 End-User Behaviors Over 15 billion devices by 2015, average person with 3 devices New workspace: anywhere, anytime 71% of Gen Y workforce do not obey policies 60% will download sensitive data on a personal device IT Trends Must control the multiple devices and guests Security: Top concern for BYOD Mobile malware has doubled (from 2010 to 2011) IT consumed with network fragmentation Reduce Security Risk Improve End-User Productivity Increase Operation Efficiency C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
21 Comprehensive Secure Access More Productive Faculty, Admin and Students Lower Operating Costs C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
22 BYOD Users get safely on the Internet fast and easy Guest Access It is easy to provide guests limited-time and limited- resource access Secure Access on Wired and Wireless Network and VPN Control with one policy across wired, wireless, and remote infrastructure Network Policy Rules written in business terms control access C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
23 Who What Where When How Security Policy Attributes Identity Context Identity Engine Wired Wireless VPN Organization-Relevant Policies Virtual machine client, IP device, guest, faculty, student, and remote user C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
24 Get users on the net in minutes, not hours Simple self-service portal for any user to get quickly on the net without help or hassle Reduce burden on IT and help desk staff Reliable automation reduces user problems to near zero so Immediate secure access Rigorous identity and access policy enforcement C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
25 Near-zero IT and help desk burden Faculty/Admin hosted Full guest lifecycle Accommodate and control Limited to Internet Time sensitive Streamlined system Integrated into the all-in-one enterprise policy control C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
26 Wired Wireless Remote Increase IT Productivity Automated onboarding and device security Enforcement embedded in the intelligent network Policy-governed unified access Dependable anywhere access C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
27 Increased Operation Efficiency Remote VPN User Wireless User Wired User Devices Virtual Desktop Policy-Based Access Control Identity and Context-Aware Network Scalable Enforcement Device Sensing VLANs Access Control Lists * Data Center Intranet Internet Security Zones C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
28 SGT Inter net Open Net Serv Net Data Center Restr ict DC Internet Superin tendent, IT Laptop Wired Net Permit Permit Permit Permit Permit All, ipad Internal Faculty, ipad VPN Student Any Permit Permit Permit Deny Deny Permit Permit Permit Permit Deny Permit Deny Deny Deny Deny Campus Cloud POLICY Policy Services 1 Services 2 IT John updates the Identity engine for BYOD and guest access policies, which are pushed to the network. Restricted Data Center Data Center Policy John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
29 Internet Brice Principal Campus Cloud Services 1 Wired Services 2 Wired Brice logs onto wired network on IT-issued laptop. Identity engine authenticates, identifies context, and applies wired execution policy. Restricted Data Center Data Center John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
30 Device Identity Internet Brice Principal Wireless AAA DID Campus Cloud Services 1 Wired Services 2 Onboarding Brice connects his new ipad to the WLAN and logs on. While Identity engine performs AAA check of his ID, Identity Engine Profiler identifies his device. Restricted Data Center Data Center John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
31 Internet Brice CFO REG Wireless Campus Cloud Services 1 Wired Services 2 Onboarding IE authenticates Brice, but does not recognize the ipad. IE redirects Brice to the onboarding portal to register his ipad. Restricted Data Center Data Center R DIR? John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
32 Internet Brice CFO Wireless Campus Cloud Services 1 Policy Wired Services 2 Onboarding IE forms a contextual identity: Brice + ipad + location. Restricted Data Center Policy Contextual Identity IE assigns a policy based on the context and grants it rolebased access. Data Center John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
33 Internet Brice Principal VPN Wireless Campus Cloud Services 1 Wired Services 2 VPN Brice uses the same ipad from a hotel room. Identity engine recognizes the context change and applies execution VPN policy.. Restricted Data Center Data Center John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
34 Brice Principal VPN Internet Sarah Sub Teacher Wireless Campus Cloud Services 1 Sponsor Wired Services 2 Brice enters guest hotspot portal and sponsors Sarah for 1-day access. Guest Sarah receives password through text message. She selects Guest WiFi, and Identity engine directs her to the guest portal to register and obtain Internet access. Restricted Data Center Data Center John IT Administrator Confidential. Product is planned, features are not committed. C Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
35 Thank you.
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationBring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG (bokng@cisco.com) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationBYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland sduernbe@cisco.com CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationCisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationhttp://www.velocis.in Extending Collaboration to BYOD Devices
Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout
More informationCisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
More informationTaking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
More informationMDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
More informationThe Holistic Guide to BYOD in Your Business Jazib Frahim
The Holistic Guide to BYOD in Your Business Jazib Frahim Technical Leader Security Services Practice Cisco Advanced Services May 8, 2012 We are in love with our devices Proliferation of Devices By 2020
More informationXenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationCisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
More informationWhat Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
More informationENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY
ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY Presenter October, 2014 MOBILITY AND THE APPLICATION INVASION 1.2 Billion SMART PHONES TO BE SHIPPED IN 2014 IDC Mobility is #1 PRIORITY
More informationBring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer Glen_stacey@dell.com
Bring Your Own Device Putting Context into Wireless Security Glen Stacey Networking Systems Engineer Glen_stacey@dell.com ipad in the News More and more ipads will find their way into the workplace in
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationLeveraging mobility in your organisation. Building an effective enterprise mobility environment that delivers competitive advantage
Leveraging mobility in your organisation Building an effective enterprise mobility environment that delivers competitive advantage Creating an environment that provides employees with freedom in where
More informationBYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationGood MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationSolutions for admission control and data loss prevention in a modern corporate network
Solutions for admission control and data loss prevention in a modern corporate network 15 th Finance Tech Forum Yasen Spasov Sales & Pre-sales Manager Executive Summary Founded in 1995 Subsidiary of INTRACOM
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationInsert Partner logo here. Financial Mobility Balancing Security and Success
Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.
More informationProductive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
More informationBYOD (Bring Your Own Device)
BYOD (Bring Your Own Device) Agenda Set the scene BYOD raising many questions Structured & Integrated answers Belgacom Entreprise Mobility Belgacom Mobile Device Management Sensitivity : "Unrestricted",
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationBYOD Security Challenges in Education: Protect the Network, Information, and Students
BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white
More informationBYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationWindows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More informationSOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com
SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationBring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless
Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy Eric Stresen- Reuter Technical Director Ruckus Wireless Bring Your Own Design SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY
More informationCisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
More informationNX 9500 INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD
CENTRALIZED SERVICE DELIVERY AND MANAGEMENT PLATFORM INTEGRATED SERVICES PLATFORM FOR THE PRIVATE CLOUD CONTROL YOUR ENTIRE NETWORK WITH A SINGLE, CENTRALIZED COMMAND CENTER Are you prepared to manage
More informationHow To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time
IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area
More informationAirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management
Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows
More informationMonitoring & Measuring: Wi-Fi as a Service
Monitoring & Measuring: Wi-Fi as a Service Parker Smith, Director of Business Development, ProCloud Services, ADTRAN IT Professional Wi-Fi Trek 2015 Agenda Wireless Trends and Impacts How Cloud Wireless
More informationSecure Network Access for Personal Mobile Devices
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
More informationMeru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
More informationYes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD
STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD
More informationPassguide 500-451 35q
Passguide 500-451 35q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Cisco 500-451 Cisco Unified Access Systems Engineer Exam 100% Valid in US, UK, Australia, India and Emirates.
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationCisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationChoosing an MDM Platform
Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationEmpowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
More informationCisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
More informationMECS: Mobile Enterprise Compliance and Security Server
MECS: Mobile Enterprise Compliance and Security Server Mobile Active Defense locks down, secures and puts your iphones, ipads, Androids, other smartphones and tablets into regulatory compliance. By employing
More informationCisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security
White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationHow To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device
Technical FAQ McAfee Enterprise Mobility Management (McAfee EMM ) 12.0 Frequently Asked Questions Q. What types of mobile devices does McAfee Enterprise Mobility Management (McAfee EMM ) support? A. McAfee
More informationDeploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationAn Intelligent Solution for the Mobile Enterprise
An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of
More informationCisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationPreparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs
CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency
More informationThe BYOD Wave: Policy, Security, and Wireless Infrastructure
The BYOD Wave: Policy, Security, and Wireless Infrastructure Ken Kaminski Security & BYOD Technical Solutions Architect Northeast CISSP, GCIA, GCFA, GAWN, GPEN Cisco Systems. 1 1. BYOD Trends & Policy
More informationWhitepaper: A Business Case For Virtual Desktop Infrastructure (VDI) Deployments
Whitepaper: A Business Case For Virtual Desktop Infrastructure (VDI) Deployments VISIT TELEPHONE 703-673-1350 EMAIL info@icore.com OFFICES Washington, DC Chicago Philadelphia Baltimore New York 1 1 Introduction
More informationF5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France
F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from
More informationCHOOSING AN MDM PLATFORM
CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than
More informationNetwork as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
More informationMOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
More informationCisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationDesign and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationSecuring Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More informationRFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationSECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
More informationMobility Challenge. Challenge #1: User Experience:
Mobility Challenge Challenge #1: User Experience: Explosion of wireless devices drives wireless access needs and issues Need for video support for distance learning, rich digital content and professional
More informationIs Your Network Ready for the ipad?
Is Your Network Ready for the ipad? Geoff Haggart Vice President, EMEA Meraki Airwatch MDM Interface ipad Exploding Onto Enterprise Networks ipad Exploding Onto Enterprise Networks Networking challenges
More informationKEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE
KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE There s been lots of buzz about the tsunamis of change hitting IT. Talk of pivoting to the cloud, the growing mobile workforce, and the Internet of Things
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More information