Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa

Similar documents
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa

BYOD Strategy and Solutions

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Extending Collaboration to BYOD Devices

Readiness Assessments: Vital to Secure Mobility

The Top Ten Advantages of Using Cisco Enterprise Networking in 2014

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Threat-Centric Security for Service Providers

Cisco Unified Access Technology Overview: Converged Access

The Internet of Things... Hype or not?

Cisco Passguide Exam Questions & Answers

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Advanced Security for Account Managers-ASAM

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Cisco Network Optimization Service

Remote Management Services Portfolio Overview

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Cisco Collaboration Architecture: Enhance Employee Effectiveness for Greater Business Impact

How the Internet of Things Will Transform the Manufacturing Industry

BYOD(evice) without BYOI(nsecurity)

Transforming Employee Engagement

Bring Your Own Device

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Cisco dan. Beograd, Srbija 1.april TOMORROW starts here.

Fast Lane México presenta su calendario de cursos:

Empowering Students with Mobility and BYOD Technology

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

Collaborative Professional Services

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Start New Conversations, Open New Doors

Cisco TrustSec Solution Overview

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Hierarchical Network Design

Enterprise Application Enablement for the Internet of Things

The Internet of Everything

The Holistic Guide to BYOD in Your Business Jazib Frahim

Mobil data hetare än någonsin.

Huawei Agile WAN Solution

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Secure Your Mobile Device Access with Cisco BYOD Solutions

Cisco Secure BYOD Solution

Welcome to the era of the anywhere worker

BYOD Security Challenges in Education: Protect the Network, Information, and Students

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Exam Questions Demo Cisco. Exam Questions Cisco Express Foundation for Field Engineers

Data Center Network Evolution: Increase the Value of IT in Your Organization

Productive and Secure Enterprise Mobility with Cisco and Citrix

Collaborazione a misura d uomo

Cisco IOS Firewall. Scenarios

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

How To Make Your Phone A Mobile Device Safe And Secure

RIOT CONTROL The Art of Managing Risk for Internet of Things

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Data Center Security That Accelerates Your Business

Evolving the Data Center Critical Cloud Success. A Light Reading Webinar Sponsored by

Brocade and Aruba Deliver Optimized and Effortless Mobility

BT One. Analyst and consultant update, September BT One. Communications that unify 1

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

A ZK Research Whitepaper. October Cisco s Branch Infrastructure Powers the HYBRID WAN

Preparing VoIP and Unified Communications Systems for IPv6 Technical Summary September 2014

Building the Next-Generation End-to-End IP Communications Architecture

End-to-End M2M and IoT Services

Cisco Desktop Virtualization with UCS: A Blueprint for Success

Cisco s BYOD / Mobility

Cisco Validated Design

Cisco Validated Design

Why Cloud Computing Needs a Cloud-Intelligent Network

Cisco / Microsoft Unified Communications Integration Overview Cisco and/or its affiliates. All rights reserved.

Network Evolution, Cloud & Future Services. Opportunities & Challenges for Next-Decade Services

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Cisco Collaboration: Improve Collaboration, Improve Business

Cloud Managed Security with Meraki MX

Cisco Intercloud Fabric Security Features: Technical Overview

Network Virtualization

Mobile Collaboration in the Public Sector: Work Your Way, on Any Device

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?

NetScaler Cloud Bridge

How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?

Implementing Cisco Secure AccessSolutions Exam

Cisco Networking Capabilities for Medianet

The Internet of Things. Giles Norman MobileFirst Consulting Manager, IBM. Daniel Dombach Director EMEA, Industry Solutions, Zebra Technologies

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Solutions for admission control and data loss prevention in a modern corporate network

The Next Generation of Collaboration Cisco Unified Communications Manager (CUCM) v10.6

EVOLVED DATA CENTER ARCHITECTURE

MAKING THE RIGHT CONNECTIONS

Cisco SecureX Product Brochure

Introduction to Cloud Networking. Meraki Solution Overview

CLOUD ADOPTION AND IPV6 TRANSITION

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

Cisco Systems, Inc. 1 of 9 1/31/2013 1:22 PM

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Advanced Routing and Switching for Field Engineers - ARSFE

Transcription:

Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa

Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

Mobility Workplace Experience Video 7 Billion New Wireless Devices by 2015 Mobile Devices IT Resources Blurring the Borders Consumer Workforce Employee Partner Physical Virtual Anyone, Anywhere, Anytime Changing the Way We Work Video projected to quadruple IP traffic by 2014 to 767 exabytes 2011 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

Automatization Back End Personalization Network of Sensors *The computers generate more info than humans *Transparency *The content Delivery *New Standards M2M, connected cars, etc. Source: Markus Angermeier 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

2011: Networked devices = world population (>6B) 2015: Networked devices = double world population (15B) Source: Cisco IBSG, Cisco VNI 2011, Morgan Stanley Research, IMS Research 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Use of Unsupported Network Devices (Total, n=511) Breach or Loss of Information Due to Unsupported Devices (Total, n=511) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

Trusted W i F i Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15

Trusted W i F i 802.11n Wi- Fi Identity Based Access Control Apply defined policy profiles based on: Device Type User Location Application Mobile Device Managem ent WAN Optimization Service Assurance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16

Trusted W i F i Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17

Trusted W i F i 802.11n Wi-Fi Location Video Optimization Spectrum Intelligence Client Acceleration Is Mr. Allen s lab work ready yet? Identity Based Access Control Not yet but i will let you know the moment it arrives Mobile Device Managemen t 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18

Untrusted W i F i Access: Limited 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19

Hotspot 2.0 802.11n Wi-Fi Web/Email Security Identity Based Access Control VPN Collaboratio n/ UC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20

3G/4G Access: Limited No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21

3G/4G Identity Based Access Control VPN Intelligent Packet Core 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22

Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23

Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook? Lunch Hour Location Streaming Media Business-related Content P2P All Object Compliance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

Desktop NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

Mobility Bring Your Own Desktop Devices NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

Mobility Bring Your Own Devices NETWORK Cloud/ Virtualization Data SaaS DC / V Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

Immersive Collaboration Pervasive Video Mobility Bring Your Own Devices NETWORK SECURITY Cloud/ Virtualization SaaS DC / V IT PRODUCTIVITY ENERGY EFFICIENCY 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

AnyConnect Virtual and Cloud Cisco SecureX Architecture Cisco SIO Context Aware Policy The Network Context Aware Enforcement Appliance Module Cloud The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

Importancia del soporte de IPV6 en el punto terminal Amenazas: Cabeceras, Private extensions, IPV4 Tunnels, etc. 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

Embedded in Device Tethered External Connectivity Services Cloud Domain Gateway to multiple sensors M2M Device Domain Low power device networks such as Zigbee, RFID etc May contain M2M Gateway M2M Cloud Domain Allows high-level application providers to use SP infrastructure This may be hosted by the Wireless network operator Mobile SP Vs M2M SP Connectivity Services Provides the IP transport infrastructure for M2M communication 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

Data Center Core Multi-Svc Energy Smart Cities Network Management FOG Connected Vehicles E-Health ONE architecture/platform for multiple services/verticals An architecture/platform Not just a set of disparate products Leading innovation 130+ IoT patents An End-to-End approach (fundamental for the IoT) with Distributed Data Processing Embedded Cisco Stack Support of legacy protocols => migration path to IP (IOS) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

Architecture for Agile Delivery of the Borderless Experience POLICY BORDERLESS END-POINT/ USER SERVICES Securely, Reliably, Seamlessly: AnyConnect MANAGEMENT CISCO SMART SERVICES BORDERLESS NETWORK SERVICES Mobility: Motion Energy Management: EnergyWise Security: TrustSec App Performance: App Velocity Multimedia Optimization: Medianet CISCO LIFECYCLE SERVICES BORDERLESS NETWORK SYSTEMS Unified Access Campus Core Unified Fabric Extended Edge Extended Cloud BORDERLESS INFRASTRUCTURE Wireless Routing Switching Application Networking/ Optimization Security PROFESSIONAL SERVICES: Realize the Value of Borderless Networks Faster 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

Borderless Experience ANYONE ANYTHING ANYWHERE ANYTIME Securely, Reliably, Seamlessly 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36