We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLevi Chopin
Modified over 2 years ago
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy & Governance Cisco Distinguished Engineer & Senior Technical Director Jawahar Sivasankaran
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Improved Employee Satisfaction Cost savings Increased Productivity
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Device Proliferation Entitlement Strategy Security Support Policy Management and Communication Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Industry BYOD Spectrum Environment Requires Tight Controls Corp Only Device Manufacturing Environment Trading Floor Classified Government Networks Traditional Enterprise Focus on Basic Services, Easy Access Broader Device Types but Internet Only Educational Environments Public Institutions Simple Guest Enable Differentiated Services, On-Boarding with Security Onsite/Offsite Multiple Device Types + Access Methods Early BYOD Enterprise Adopters Corp Native Applications, New Services, Full Control Any Device, Any Ownership Innovative Enterprises Retail on Demand Mobile Sales Services (Video, Collaboration, etc.) LIMITADVANCEDENHANCEDBASIC
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Any Trusted Device Industry Standard Platforms Cisco AnyConnect and MDM Scaled Architecture Employee Purchased Devices Corporate and Personal Service Strong Rules of Use Flexible Liability Circular Business Client Choice Any Device Plans Competitive Market Spend Management SP Choice Self-Service Content One to Many Interactive Traditional One to One Tailored Support
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Architectural Principles Device security posture assurance User authentication and authorization Secure storage of corporate data at rest Execution Elements Policy Enforcement Local Access Control Device Encryption Remote Wipe * Inventory Tracking Asset Management Device Registration Device Identification User Audit Trail Forensic Capabilities
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 time
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 RegisterRegister ProfileProfile PosturePosture Enforce ment Internet Only Networking (ION) Core Network (Corporate Wifi) Guest Network Cloud Services ManagementManagement 4 Digit PIN PIN 10 Minute Timeout RemoteWipeRemoteWipe EncryptionEncryption
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Remote Access /VPN (Hardware & Software) WIRELESSWIRED
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Thank you.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing “The BYOD Gap” Richard Absalom, Analyst, Consumer Impact Technology.
© 2011 VMware Inc. All rights reserved Confidential Why Choose Horizon Suite Over Citrix? Cyndie Zikmund, EUC Competitive Marketing February, 2013.
© Aladdin Knowledge Systems 2006 Aladdin eToken Overview Bill Dolan Regional Manager – Northeast
Mobile Security, Everything you NEED to know about Endpoint Security but were afraid to ask ! Matthew Johnson – Senior Technical Staff Member Mobility.
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2007 IBM Corporation The Business Value of Information N Glen Grant Alliance Manager 25 May 2007.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
© 2011 Verdasys, Inc. All Rights Reserved. CONFIDENTIAL AND PROPRIETARY - DO NOT REPRODUCE. Enterprise Information Protection When DLP is Not Enough? Graham.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
I MPACT VAN BYOD EN M OBIELE DEVICES OP UW HUIDIGE DESKTOP EN CLIENT ARCHITECTUUR.
Global Education Industry Building a Smarter Classroom Investing in Education to Stimulate and Sustain the Economy IBM Global Education Industry © Copyright.
Impacts of 3 rd Party IaaS on broadband network operations and businesses Prabhat Kumar Managing Partner, i 3 m 3 Solutions.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
CITC Opening Keynote - Vision for Content in the Cloud Geng Lin, Ph.D. CTO, Cisco-IBM Alliance Cisco Systems CONTENT IN THE CLOUD DCIA.
Office 365 for education Customer Deck. | Copyright© 2010 Microsoft Corporation MEET STUDENT AND EDUCATOR NEEDS LEARNING FROM ANYWHERE LOWER COSTS ENTERPRISE.
1 CREDANT Confidential. 1 NLIT CREDANT Company Overview 2007 Data Security Leadership Quadrant 2007 & 2008: #1 Fastest Growing Private (Security)
How well REALLY move to the cloud – the coming alignment between hosters and cloud platform providers Dave Wright.
1Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Dean Ocampo, CISSP, Check Point Software Manager, Web Security Product Marketing Steve Neville, Entrust, Inc. Sr. Manager, Identity Products & Solutions.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
How Microsoft does end-to-end IT Security Bruce Cowper Senior Program Manager, Security Initiative Microsoft Canada.
Oracle Industry Solutions Complex Equipment Manufacturing Information Age Applications.
January 23-26, 2007 Ft. Lauderdale, Florida Realizing the Service Convergence Boom Opportunities & Challenges.
Chapter 7. Discuss Intranet and its benefits Discuss e-commerce and various forms of e-commerce Discuss the security issues in the e-commerce environment.
Copyright Hub Software Engineering Ltd 2010All rights reserved Hub Workflow Product Overview.
© 2016 SlidePlayer.com Inc. All rights reserved.