BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987
Presentation_ID 2
Presentation_ID 3
Presentation_ID 4
Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information workers spend time working OUTSIDE THE OFFICE 3/4 of employees uses MULTIPLE DEVICES for work 100% of IT staff STRUGGLE to keep up with mobile needs 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Desktop Service Solutions Address a Wide Variety of Needs Mobile-Secure Desktop Flexible and secure access to data and applications from any device whether in the office, remote or on the road. Business Process Desktop Secure access to data and applications for outsource contact centers, developers and back office employees. to developers. Branch Office Desktop Flexible and secure access to data and applications from remote and branch offices with limited or no local IT support. Always On Desktop Highly available and access to data and applications for employees requiring business continuity and disaster recovery desktops. Task Workers Knowledge Workers Power Users Mobile Users 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 6
The BYOD Spectrum LIMITED BASIC ENHANCED ADVANCED Environment Requires Tight Controls Basic access for additional devices Any device, anywhere, enhanced security Corp Native Applications, New Services, Full Control Corp Only Device IT Managed devices with on-site access only All other devices prohibited Broader Device Types but Internet Only IT managed devices limited off-site access (mail, calendar) Internet access only for Guest Devices Multiple Device Types + Access Methods Corporate and employee owned devices - on-site and off-site access Device-side Security Any Device, Any Ownership Custom Apps Enhanced Guest Services Multi-media Collaboration 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
IT Mobility Challenges Visibility Control Can I determine the number of users and devices on my network? Can I enforce policies to manage network access and keep my data secure? Experience Can I ensure a consistent and reliable user experience however users connect to my network? Scalability Can my network scale to meet the growing number of devices and increased demand? 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 8
IT Mobility Goals RESOURCES MANAGE USERS Desktop Service Universal Services Broker App Catalog Service Users, Desktops, Apps, Data Policies End Users Data Service Secure Universal Access 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 9
Trusted WiFi Apply defined policy profiles based on: Device Type User Location Application Presentation_ID 10
Trusted WiFi Are the clients here yet? Not yet but i will let you know the moment they arrive. Presentation_ID 11
3G/4G Access: Limited No Yes Customer database Mobile TelePresence Email Instant Messenger Presentation_ID 12
Trusted WiFi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Email Instant Messenger Presentation_ID 13
Nexus BYOD Assessment * Network inventory and performance Assessment Voice and Video Readiness Assessment Active or passive Wireless Site survey Security Configuration and Policy Assessment Application Inventory and VDI compatibility Assessment * Some assessments will be fee based. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Nexus BYOD Design and Implementation Nexus Certified Engineers to gather requirements and design complete solution Adherence to multiple Manufacturer best practices Nexus Certified Engineers to implement and test end to end solution components. Day two support through NexusCare Managed Services 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Nexus Solution Components Presentation_ID 16
Infrastructure Presentation_ID 17
Secure BYOD Architecture Cisco Prime Infrastructure Identity Services Engine Cisco Catalyst Switches Cisco WLAN Controller Wireless Network MDM Manager Wired Network Virtual Desktop Management AnyConnect VPN 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Unified Communications Workspace A Common Experience Across Devices 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Virtualization Presentation_ID 20
Compute Environment Presentation_ID 21
Questions 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22