BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

Similar documents
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Bring Your Own Device

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Empowering Students with Mobility and BYOD Technology

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Cisco Secure BYOD Solution

Productive and Secure Enterprise Mobility with Cisco and Citrix

Cisco Validated Design

Cisco Validated Design

Cisco Unified Access Technology Overview: Converged Access

Addressing BYOD Management Challenges with Cisco Prime

Readiness Assessments: Vital to Secure Mobility

Cisco s BYOD / Mobility

Cisco TrustSec Solution Overview

Cisco estore Modernizes Shopping for IT Services

Generating leads with Meraki's Systems Manager. Partner Training"

Remote Management Services Portfolio Overview

What Is Cisco Mobile Workspace Solution?

Secure Your Mobile Device Access with Cisco BYOD Solutions

Athena Mobile Device Management from Symantec

CISCO SMB CLASS MOBILITY AND WIRELESS SOLUTIONS: THE RESPONSIVE WORKFORCE

PRESIDIO MANAGED SERVICES OVERVIEW JULY 2013

Network Infrastructure Data Center Wireless Telephone Video Network Security Surveillance

Cisco Mobile Collaboration Management Service

Meraki 2015 Solution Brochure

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

How To Support Bring Your Own Device (Byod)

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Introduction to Cloud Networking. Meraki Solution Overview

Why Migrate to the Cisco Unified Wireless Network?

How Cisco IT Built Virtual Desktop Infrastructure

VMware Horizon DaaS: Desktop as a Cloud Service (DaaS)

Secure mobility with Citrix & Cisco

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco WAAS Optimized for Citrix XenDesktop

End User Computing - Cloud Client Computing

Move beyond BYOD to Mobile Workspace with Cisco and Citrix

BT One. Analyst and consultant update, September BT One. Communications that unify 1

BYOD(evice) without BYOI(nsecurity)

Symantec Mobile Management for Configuration Manager 7.2

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Managing Mobility in the BYOD Era:

Cisco Smart Business Communications System: A New Way for Small Business to Communicate

Cisco and Citrix for Productive and Secure Enterprise Mobility citrix.com

Enterprise Mobility Solution Puts Unified Communications on the Smartphones Employees Love

Meraki: Introduction to Cloud Networking

What We Do: Simplify Enterprise Mobility

Extending the Power of Virtualization in End-User Computing Barry Flanagan End-User Computing Partner Strategy

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Embracing Complete BYOD Security with MDM and NAC

Mobile and BYOD Strategy

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Cisco Desktop Virtualization Solutions

Preparing your network for the mobile onslaught

Cisco & Big Data Security

FLEXIBILITY AGILITY AVAILABILITY BOLSTER YOUR BANK S I.T.

Choosing an MDM Platform

Systems Manager Cloud Based Mobile Device Management

IT Managed Services Network services Collaboration

Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution

Cisco Unified Communications Predeployment, Deployment, and Postdeployment Service Bundle

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Building a BYOD Strategy For Education

Course Content for Managing Cisco Wireless LANs (WMNGI 1.2) Duration : 4 Days

Solution Requirements and Process Flow

Simple, scalable and secure unified wired and wireless networking

Cisco Network Optimization Service

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Systems Manager Cloud-Based Enterprise Mobility Management

Cisco Incident Response and Workforce Enablement for the Utility

PCI Compliance: Improve Payment Security

End-to-End Infrastructure Solutions

CHOOSING AN MDM PLATFORM

Solutions for admission control and data loss prevention in a modern corporate network

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

Transcription:

BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987

Presentation_ID 2

Presentation_ID 3

Presentation_ID 4

Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information workers spend time working OUTSIDE THE OFFICE 3/4 of employees uses MULTIPLE DEVICES for work 100% of IT staff STRUGGLE to keep up with mobile needs 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Desktop Service Solutions Address a Wide Variety of Needs Mobile-Secure Desktop Flexible and secure access to data and applications from any device whether in the office, remote or on the road. Business Process Desktop Secure access to data and applications for outsource contact centers, developers and back office employees. to developers. Branch Office Desktop Flexible and secure access to data and applications from remote and branch offices with limited or no local IT support. Always On Desktop Highly available and access to data and applications for employees requiring business continuity and disaster recovery desktops. Task Workers Knowledge Workers Power Users Mobile Users 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 6

The BYOD Spectrum LIMITED BASIC ENHANCED ADVANCED Environment Requires Tight Controls Basic access for additional devices Any device, anywhere, enhanced security Corp Native Applications, New Services, Full Control Corp Only Device IT Managed devices with on-site access only All other devices prohibited Broader Device Types but Internet Only IT managed devices limited off-site access (mail, calendar) Internet access only for Guest Devices Multiple Device Types + Access Methods Corporate and employee owned devices - on-site and off-site access Device-side Security Any Device, Any Ownership Custom Apps Enhanced Guest Services Multi-media Collaboration 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

IT Mobility Challenges Visibility Control Can I determine the number of users and devices on my network? Can I enforce policies to manage network access and keep my data secure? Experience Can I ensure a consistent and reliable user experience however users connect to my network? Scalability Can my network scale to meet the growing number of devices and increased demand? 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 8

IT Mobility Goals RESOURCES MANAGE USERS Desktop Service Universal Services Broker App Catalog Service Users, Desktops, Apps, Data Policies End Users Data Service Secure Universal Access 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 9

Trusted WiFi Apply defined policy profiles based on: Device Type User Location Application Presentation_ID 10

Trusted WiFi Are the clients here yet? Not yet but i will let you know the moment they arrive. Presentation_ID 11

3G/4G Access: Limited No Yes Customer database Mobile TelePresence Email Instant Messenger Presentation_ID 12

Trusted WiFi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger Presentation_ID 13

Nexus BYOD Assessment * Network inventory and performance Assessment Voice and Video Readiness Assessment Active or passive Wireless Site survey Security Configuration and Policy Assessment Application Inventory and VDI compatibility Assessment * Some assessments will be fee based. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

Nexus BYOD Design and Implementation Nexus Certified Engineers to gather requirements and design complete solution Adherence to multiple Manufacturer best practices Nexus Certified Engineers to implement and test end to end solution components. Day two support through NexusCare Managed Services 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

Nexus Solution Components Presentation_ID 16

Infrastructure Presentation_ID 17

Secure BYOD Architecture Cisco Prime Infrastructure Identity Services Engine Cisco Catalyst Switches Cisco WLAN Controller Wireless Network MDM Manager Wired Network Virtual Desktop Management AnyConnect VPN 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

Unified Communications Workspace A Common Experience Across Devices 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

Virtualization Presentation_ID 20

Compute Environment Presentation_ID 21

Questions 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22