Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa
Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Mobility Workplace Experience Video 7 Billion New Wireless Devices by 2015 Mobile Devices IT Resources Blurring the Borders Consumer Workforce Employee Partner Physical Virtual Anyone, Anywhere, Anytime Changing the Way We Work Video projected to quadruple IP traffic by 2014 to 767 exabytes 2011 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Automatization Back End Personalization Network of Sensors *The computers generate more info than humans *Transparency *The content Delivery *New Standards M2M, connected cars, etc. Source: Markus Angermeier 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
2011: Networked devices = world population (>6B) 2015: Networked devices = double world population (15B) Source: Cisco IBSG, Cisco VNI 2011, Morgan Stanley Research, IMS Research 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Use of Unsupported Network Devices (Total, n=511) Breach or Loss of Information Due to Unsupported Devices (Total, n=511) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Trusted W i F i Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Trusted W i F i 802.11n Wi- Fi Identity Based Access Control Apply defined policy profiles based on: Device Type User Location Application Mobile Device Managem ent WAN Optimization Service Assurance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Trusted W i F i Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Trusted W i F i 802.11n Wi-Fi Location Video Optimization Spectrum Intelligence Client Acceleration Is Mr. Allen s lab work ready yet? Identity Based Access Control Not yet but i will let you know the moment it arrives Mobile Device Managemen t 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Untrusted W i F i Access: Limited 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Hotspot 2.0 802.11n Wi-Fi Web/Email Security Identity Based Access Control VPN Collaboratio n/ UC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
3G/4G Access: Limited No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
3G/4G Identity Based Access Control VPN Intelligent Packet Core 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook? Lunch Hour Location Streaming Media Business-related Content P2P All Object Compliance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Desktop NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Mobility Bring Your Own Desktop Devices NETWORK Data Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Mobility Bring Your Own Devices NETWORK Cloud/ Virtualization Data SaaS DC / V Center 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Immersive Collaboration Pervasive Video Mobility Bring Your Own Devices NETWORK SECURITY Cloud/ Virtualization SaaS DC / V IT PRODUCTIVITY ENERGY EFFICIENCY 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
AnyConnect Virtual and Cloud Cisco SecureX Architecture Cisco SIO Context Aware Policy The Network Context Aware Enforcement Appliance Module Cloud The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Importancia del soporte de IPV6 en el punto terminal Amenazas: Cabeceras, Private extensions, IPV4 Tunnels, etc. 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Embedded in Device Tethered External Connectivity Services Cloud Domain Gateway to multiple sensors M2M Device Domain Low power device networks such as Zigbee, RFID etc May contain M2M Gateway M2M Cloud Domain Allows high-level application providers to use SP infrastructure This may be hosted by the Wireless network operator Mobile SP Vs M2M SP Connectivity Services Provides the IP transport infrastructure for M2M communication 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Data Center Core Multi-Svc Energy Smart Cities Network Management FOG Connected Vehicles E-Health ONE architecture/platform for multiple services/verticals An architecture/platform Not just a set of disparate products Leading innovation 130+ IoT patents An End-to-End approach (fundamental for the IoT) with Distributed Data Processing Embedded Cisco Stack Support of legacy protocols => migration path to IP (IOS) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Architecture for Agile Delivery of the Borderless Experience POLICY BORDERLESS END-POINT/ USER SERVICES Securely, Reliably, Seamlessly: AnyConnect MANAGEMENT CISCO SMART SERVICES BORDERLESS NETWORK SERVICES Mobility: Motion Energy Management: EnergyWise Security: TrustSec App Performance: App Velocity Multimedia Optimization: Medianet CISCO LIFECYCLE SERVICES BORDERLESS NETWORK SYSTEMS Unified Access Campus Core Unified Fabric Extended Edge Extended Cloud BORDERLESS INFRASTRUCTURE Wireless Routing Switching Application Networking/ Optimization Security PROFESSIONAL SERVICES: Realize the Value of Borderless Networks Faster 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Borderless Experience ANYONE ANYTHING ANYWHERE ANYTIME Securely, Reliably, Seamlessly 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36