© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.

Slides:



Advertisements
Similar presentations
1 Video Cloud for Business Enterprises Geng Lin CTO, IBM Alliance Cisco Systems P2P & Cloud Media Summit Los Angeles, CA May 6, 2010 Geng Lin CTO, IBM.
Advertisements

Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Leap into Innovation 7 Cloud Facts You Can't Afford to Ignore James Lambe Canadian Director, Google Enterprise.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Partner Summit 2011 Padmasree Warrior CTO and SVP/GM, Enterprise, Commercial.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Director, IN-FM Cisco BYOD Smart Solution: Freedom, Flexibility & Choice to Work Your Way Lanre.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
CLOUD COMPUTING.  It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform).  One can use.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Enterprise Mobility ‘Mobile First’ strategy for your Business
Centrix Software Application discovery and management 8 November 2012 Richard Pegden Director of Product Marketing.
ENTERPRISE MOBILITY. IT CONSUMERIZATION Social Media Cloud Services Mobile Devices.
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Confidential The Power to Connect. Business presentations in boardrooms, conference rooms and outside the office are always in high demand. With CircleHub,
C © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 C © 2013 Cisco and/or its affiliates. All rights.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
·
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Joel Hackney Senior Vice President Global Sales & Marketing and President, Field Operations Avaya Vision.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
IoTs Capabilities. IoTs Capabilities What is IoTs? Control / Information Internet Devices.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
How Mobile Transforms the Enterprise
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 The New Collaboration Experience Name | Title.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
LIMPOPO DEPARTMENT OF ECONOMIC DEVELOPMENT, ENVIRONMENT AND TOURISM The heartland of southern Africa – development is about people! 2015 ICT YOUTH CONFERENCE.
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 ISE BYOD Jim Kotantoulas Consulting Systems Engineer – Security Technologies.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
With Office 365, Collaborative Solution by Qorus Streamlines Document Assembly and Enhances Productivity for Any Business-Critical Documents OFFICE 365.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Cloud Faxing for Law Firms
Hybrid Cloud Web Filtering Platform
A Shift in the Data Security Paradigm
Virtual Private Networks (VPN)
Transforming business
Cloud adoption NECOOST Advisory | June 2017.
Mobile Data Solutions Inc
Mobile Device Management options in Office 365 and beyond
Impact of IT Consumerisation on Enterprise Security
Veeam Backup Repository
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Software Defined Networking Market to grow at 54% CAGR from 2017 to 2024:
Network Access Control 101 Securing the Critical Edge of Your Network
BOMGAR REMOTE SUPPORT Karl Lankford
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Pack Your Park by Modernizing Your Business Online
Microsoft Virtual Academy
Presentation transcript:

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy & Governance Cisco Distinguished Engineer & Senior Technical Director Jawahar Sivasankaran

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Improved Employee Satisfaction Cost savings Increased Productivity

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Device Proliferation Entitlement Strategy Security Support Policy Management and Communication Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Industry BYOD Spectrum Environment Requires Tight Controls Corp Only Device Manufacturing Environment Trading Floor Classified Government Networks Traditional Enterprise Focus on Basic Services, Easy Access Broader Device Types but Internet Only Educational Environments Public Institutions Simple Guest Enable Differentiated Services, On-Boarding with Security Onsite/Offsite Multiple Device Types + Access Methods Early BYOD Enterprise Adopters Corp Native Applications, New Services, Full Control Any Device, Any Ownership Innovative Enterprises Retail on Demand Mobile Sales Services (Video, Collaboration, etc.) LIMITADVANCEDENHANCEDBASIC

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Any Trusted Device Industry Standard Platforms Cisco AnyConnect and MDM Scaled Architecture Employee Purchased Devices Corporate and Personal Service Strong Rules of Use Flexible Liability Circular Business Client Choice Any Device Plans Competitive Market Spend Management SP Choice Self-Service Content One to Many Interactive Traditional One to One Tailored Support

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Architectural Principles Device security posture assurance User authentication and authorization Secure storage of corporate data at rest Execution Elements Policy Enforcement Local Access Control Device Encryption Remote Wipe * Inventory Tracking Asset Management Device Registration Device Identification User Audit Trail Forensic Capabilities

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 time

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 RegisterRegister ProfileProfile PosturePosture Enforce ment Internet Only Networking (ION) Core Network (Corporate Wifi) Guest Network Cloud Services ManagementManagement 4 Digit PIN PIN 10 Minute Timeout RemoteWipeRemoteWipe EncryptionEncryption

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Remote Access /VPN (Hardware & Software) WIRELESSWIRED

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Thank you.