byod and beyond -...

Post on 07-May-2018

236 Views

Category:

Documents

7 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Beyond BYODMobility, Cloud and the Internet of Everything

COCCOC-2002

Donald Gunn, Program Manager Cisco IT

© 2015 Cisco and/or its affiliates. All rights reserved.COCCOC-2002 Cisco Public

Agenda

• Changing Environment

• Devices

• Security

• Support

• Cloud & Apps

• Questions

"BYOD strategies are the most radical change to the economicsand the culture of client computing in business in decades,"

Gartner, May 2013

Okta. 2014

Companies in the United States are twice as likely to allow BYOD as those in Europe

Gartner

Devices Apps Data Networks People

Identity &

Context

Devices,

Appliances &

Things

Apps & Cloud

Services

• Who

• Role\HR

• Where

• When

• How

• Policy

Device / Enterprise

Management

Trusted \

UntrustedeStore

Context

Compliance

Device ID

UserID

What applications

can you access? What devices

can you use?

Other14,365 38,399 15,635 17564

78,208 31,80510,073

69,960

Personally

Owned

Mobile

Devices

(BYOD)

122,759

Corporate

Provided

Devices

980

29.4%

Growth

2,673

BlackBerry

Android

Apple

0

10000

20000

30000

40000

50000

60000

70000

80000

Fixed Computing

(you go to the device)

1995

Mobility / BYOD

(the device goes with you)

2000

Internet of Things

(age of the device)

2013

Internet of Everything

(people,process,data,things)

2020

Source: Cisco IBSG, 2013

200M

10B

50B

De

vic

es

49,000 employees are using a

personally owned deviceCompany

Owned 65%

Personally

Owned 35%

End-user devices

70,000 personally owned devices

313,000personally owned devices

1. 2012 Cisco IBSG Horizons Study

Policy Technology

• Device to user attribution

• Encryption

• 6 character PIN / password

• Jailbreak / Rooted Device Detection

• 10 Minute Auto Lock

• Anti-malware

• Minimum OS Version

• Remote Wipe

• Hardware/Software Inventory

Device Categories

Local and Remote Wipe

Encryption andManagement

4 Digit PIN10 Minute Timeout

Trusted DevicesSecured Devices

Core

Network

Internet Only

Network

Public Cloud

Trusted

Devices

Untrusted Devices

Identity Services Engine

Wireless Devices

Mobile

Device

Management

AnyConnect VPN

Web Security Appliance

Wired Network Devices

Adaptive Security

Appliance

Cisco Core Network

Cisco Identity Services Engine (ISE)

WHERE WHENWHAT HOWWHO

Context-aware Identity and Authentication Services

• Identity of a device on the network

• Quantify the risk

1. Profiling

• User and end device attribution

• Identification of end points on Wireless connections

2. Authentication

• Device security posture identification

• Allows for better policy & security decisions

3. Posture

• Ability to enforce policy decisions based on context

• Untrusted devices have restricted access

4. Enforcement

ISE Capability Phasing

ISE 1.2 ISE 1.2 ISE 1.3

Corporate

Connectivity

Corporate

Apps & Services

Carrier

Connectivity

Device Hardware

Device OS

User, Carrier, Hardware Manufacturer

Self Support Evolution

Consumerized Communications

Collect intelligence from service providers, blogs, Twitter, and other sources

Build a multimedia comms plan, including video, digital signage, social content, and email

Participate in launch events and execute comms plan immediately following the announcement

Communicate any issues broadly and succinctly; set expectations frequently

Manage escalations consistently; people are very passionate and emotional

We’ll use Dropbox

(but not tell IT).

You saw this coming.

File Servers are

internal only.

And it’s all IT offers.

Dropbox works

anywhere.

It’s free. Really.

Facebook, Twitter, LinkedIn, YouTube,

Flickr, Foursquare, Instagram, Pinterest, MySpace, Google+, DeviantArt, LiveJournal,

Tagged, Orkut, Ning, Meetup, myLife, Multiply,

Tumblr, Reddit, StumbleUpon, Path, FlipBook, Reeder,

Dropbox, Box, Google Drive, iCloud, SkyDrive, CloudOn,

TED, CNN, iMessage, Game Center, QuickOffice,

Penultimate, Dragon, iTunes, Pandora, Spotify, Slacker, Rdio,

WatchESPN, Siri, Google Now, and…

“So I’ll just block it”

?Approx

2.5

Million

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

Device Backups

+50,000 iOS 7 Devices

File Sharing

File Sharing

Why is This Happening!?!

Device Backups

+50,000 iOS 7 Devices

File Sharing

File Sharing

We had to allow usage to get

this data.

Blocking leaves you blind.

Device Backups

+50,000 iOS 7 Devices

File Sharing

File Sharing

Allow is the new Block

Secure Cloud

Sync

Backup Sync

Corporate stays

Corporate

Personal stays

Personal

Whole device remote

wipe becomes

a benefit!

Cisco IT App Selection

Basics

Mobile

Mail

eStore Apps

Collaboration

Tools

Connectivity Content and

Collateral

Learning

News &

Events

Sales BetaEmployee

Services

The Cisco eStore

Re

Entitlement Approvals TaxonomyChargebackReporting

Desktop Apps

Mobile Apps

Desktop HWWebEx Social Apps

Virtual HW

Mobile HW

Access to Storefront from

all OS & Device Types

Pervasive Security(versions, enforcement,

trusted devices)

Personalized, User Friendly

Catalog for all IT Services

Integrated with Enterprise

Service Management

Automated and Seamless

Service Provisioning

Cisco eStore

Cisco Prime

Service Catalog

Cisco Process

Orchestrator

Native• Data stored on device

• Highest performance

• Native device experience

HTML5 / Browser• Data may be stored on device

or vendor cloud store

• Portable to many devices

• Browser experience

Virtual• No local data on device

• Highest security

• Translated experience

Native Application

HTML5 / Browser

Virtualization

“Sorry to bother you tonight, but is there any chance you can

approve two purchases right now? This is urgent. Thanks.” – Text

Message at 20:24 on Friday

AnyConnect

automatically creates

a secure tunnel

using certificates

I log in to

MyApprovals with

SSO and approve

the two purchases.

82% more devices 28% more users 203% more data usage

33% fewer cases 28% higher satisfaction 25% lower per user cost

*2 year comparison

© 2015 Cisco and/or its affiliates. All rights reserved.COCCOC-2002 Cisco Public

Complete Your Online Session Evaluation

• Please complete your online sessionevaluations after each session.Complete 4 session evaluations& the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt.

• All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations

top related