We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLevi Chopin
Modified over 2 years ago
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy & Governance Cisco Distinguished Engineer & Senior Technical Director Jawahar Sivasankaran
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Improved Employee Satisfaction Cost savings Increased Productivity
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Device Proliferation Entitlement Strategy Security Support Policy Management and Communication Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Industry BYOD Spectrum Environment Requires Tight Controls Corp Only Device Manufacturing Environment Trading Floor Classified Government Networks Traditional Enterprise Focus on Basic Services, Easy Access Broader Device Types but Internet Only Educational Environments Public Institutions Simple Guest Enable Differentiated Services, On-Boarding with Security Onsite/Offsite Multiple Device Types + Access Methods Early BYOD Enterprise Adopters Corp Native Applications, New Services, Full Control Any Device, Any Ownership Innovative Enterprises Retail on Demand Mobile Sales Services (Video, Collaboration, etc.) LIMITADVANCEDENHANCEDBASIC
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Any Trusted Device Industry Standard Platforms Cisco AnyConnect and MDM Scaled Architecture Employee Purchased Devices Corporate and Personal Service Strong Rules of Use Flexible Liability Circular Business Client Choice Any Device Plans Competitive Market Spend Management SP Choice Self-Service Content One to Many Interactive Traditional One to One Tailored Support
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Architectural Principles Device security posture assurance User authentication and authorization Secure storage of corporate data at rest Execution Elements Policy Enforcement Local Access Control Device Encryption Remote Wipe * Inventory Tracking Asset Management Device Registration Device Identification User Audit Trail Forensic Capabilities
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 time
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 RegisterRegister ProfileProfile PosturePosture Enforce ment Internet Only Networking (ION) Core Network (Corporate Wifi) Guest Network Cloud Services ManagementManagement 4 Digit PIN PIN 10 Minute Timeout RemoteWipeRemoteWipe EncryptionEncryption
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Remote Access /VPN (Hardware & Software) WIRELESSWIRED
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Thank you.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Director, IN-FM Cisco BYOD Smart Solution: Freedom, Flexibility & Choice to Work Your Way Lanre.
Total Enterprise Mobility Comprehensive Management and Security
CLOUD COMPUTING. It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform). One can use.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Enterprise Mobility ‘Mobile First’ strategy for your Business EMPOWERING BUSINESS TRANSFORMATION.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 ISE BYOD Jim Kotantoulas Consulting Systems Engineer – Security Technologies.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 The New Collaboration Experience Name | Title.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Partner Summit 2011 Padmasree Warrior CTO and SVP/GM, Enterprise, Commercial.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
Leap into Innovation 7 Cloud Facts You Can't Afford to Ignore James Lambe Canadian Director, Google Enterprise.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
ENTERPRISE MOBILITY. IT CONSUMERIZATION Social Media Cloud Services Mobile Devices.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Virtual techdays INDIA │ 9-11 February 2011 Collaboration Strategy For Enterprises To Adopt SharePoint 2010 Azhar Amir │ SharePoint Architect, Infosys.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
1 Vodafone Business Cloud 1 Your cloud. Your business. Katia Stathaki, Head of Corporate, VGE and Enterprise Solutions.
Security for Mobile Devices FedCASIC March 2014 Dennis Pickett Westat.
IoTs Capabilities What is IoTs? 3 Devices Internet Control / Information.
Addition to Networking. There is no unique and standard definition out there Cloud Computing is a general term used to describe a new class of network.
Nick Randolph: Built To Roam Dave Glover: Microsoft.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
PC Security Data protection through device lockdown (Group Policy, app mgmt., OSD, compliance) Hardening devices against attack (patch, anti-malware,
How Mobile Transforms the Enterprise Raul Castanon-Martinez Sr. Analyst, Enterprise Mobility and Cloud 451 Research.
LIMPOPO DEPARTMENT OF ECONOMIC DEVELOPMENT, ENVIRONMENT AND TOURISM The heartland of southern Africa – development is about people! 2015 ICT YOUTH CONFERENCE.
1 Video Cloud for Business Enterprises Geng Lin CTO, IBM Alliance Cisco Systems P2P & Cloud Media Summit Los Angeles, CA May 6, 2010 Geng Lin CTO, IBM.
Raya for Information Technology. About US Raya IT, established in 1998, operates in the field of systems integration and IT business solutions. A.
20 21 Remote Wipe.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection Committed to innovative, easy-to-use security Recognized by Gartner Research.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
Meraki Overview Company and product introduction Brian Sellers Regional Sales Manager Austin, Texas (512) Fred Meek Systems.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
© 2017 SlidePlayer.com Inc. All rights reserved.