Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved.
Marcelo Ehalt
Diretor de Engenharia
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Cisco Systems
• Cultura
• Governança / Políticas de acesso .. acompanha o usuário
• Novas tecnologias/meios de acesso
• Maiores velocidades;
• Computação em núvem
• Flexibilidade de dispositivos
• Anywhere, Anytime, Any Device & Any “application”
• Vídeo pervasivo
• Novo espaço de trabalho
• Nova geração (Net generation)
Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 3
Cisco IT Device Landscape
Corporate Laptops (CYOD)
Mobile Devices (BYOD)
Other
34,974
16,429 33,940 12,169 4,247 878
7,406 83,861
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
• Any Trusted Device
• Industry Standard Platforms
• Cisco AnyConnect and Device Mgmt.
• Pervasive Wireless and ISE
Scaled Architecture
• BYOD-only Smartphones and Tablets
• Corporate Laptops
• Optional Corporate Mobile Service
• Strong Policy and Rules of Use
Flexible Liability
• Service Provider Relationships
• Pro-active cost optimization strategies
• Industry-first pricing models
Spend Management
• User-Driven Progression
• Collaboration Apps
• Enterprise and LOB Selection
• Cisco eStore
Robust App Lifecycle
• Proactive Communications
• Self-Service Content
• One to Many Interactive Support
• Traditional One to One
Social Support
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Scaled Architecture
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Local and Remote Wipe
Encryption and Management
4 Digit PIN
10 Minute Timeout
Trusted Devices
Secured Devices
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Network Edge
Core Network
4 Digit
PIN 10 Minute
Timeout
Remote
Wipe
Management
Encryption
Secured Devices
Trusted Devices
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Consistent Security Policy Enforcement Network-wide
• Physical desktops, virtual desktops, mobile devices
• Wired, Wireless, Remote Access
• Bound to point of access
• Supports Data Security, Access Control, and Compliance
• Protects intellectual property Self Registration
• Automation & Self Registration
WHERE WHEN WHAT HOW WHO
Context-aware Identity and Authentication Services
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Flexible Liability Strategy
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
All users must accept rules of use when signing up for service
There is no IT jargon – the rules are simple for end-users to understand
Cisco has a trade off between employee trust and IT control
Cisco Rules of Use
1) Allows Cisco to remotely wipe the device
2) Requires an acceptable password and 10 minute timeout
3) Requires users to immediately report a lost or stolen device.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• I want an iPhone with email, calendar, and contacts.
Jan 2010
• I want WebEx Meeting Center and Jabber IM on my iPhone.
Jan 2011
• I want AnyConnect and Enterprise Apps on my iPhone and iPad .
Jan 2012
• I want Enterprise Apps and Data on any device, natively.
Jan 2013
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
EasyApps @Work
Security Collaboration Function eStore
Virtualization
Basics
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Software
Business Applications
PC Software
Mobile Apps
IWE Apps
Network
Extranet Partner Connection
Global Network
Home & Mobile Office
Collaboration
Instant Messaging
WebEx Conferencing
Email & Calendaring
Enterprise Document
Management
Telepresence & Video Conferencing
IWE & Social Collaboration
Video - Live & On Demand
Devices
Laptops & Desktops
Smartphones & Tablets
IP Phones & Voice
IT Infrastructure &
Platform Services
CITEIS
Strategic Innovation Database Hosting & ERP
Datacenter Computing
Datacenter Network
Application & Web Services
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
• Major Issue
• Requires High-Level Expertise
• Time Sensitive Call
• Minor Issue
• Requires Some Expertise
• Not Time Sensitive
Open a Case Online
• General Information
• How To
• Availability Self Support
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Making it Happen: Tangible Results
Cisco Confidential Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 24
82% more devices 28% more users 203% more data usage
33% fewer cases 28% higher satisfaction 25% lower per user cost
*2 year comparison
Mobility Service Metrics
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Wireless Everywhere
Mobile
Devices
Hardware VPN (always on,
wireless)
Software VPN
Extension Mobility
Softphone:
Cisco Jabber
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Mobility: Jabber Client – IM, Presence, Click to Call / Video
Search and dial bar
Tab Views
Contacts
History
Visual Voicemail
Custom Apps
Logged in User
Contact
Name, Presence
and photo
Manual Presence
Compact View
(Offline contacts
hidden)
Start voice/video
call
Call Forwarding
Calling Mode
(Soft / Desk phone) Full HD Video
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Partner Location
Customer Location
Supplier Location
Airport
Hotel
Starbucks
Home
Home
Group / Drop-in Space
Flexible Office
Office Audio Privacy Rooms
Group Anchor
Thank you.