We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byLevi Chopin
Modified over 7 years ago
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy & Governance Cisco Distinguished Engineer & Senior Technical Director Jawahar Sivasankaran
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Improved Employee Satisfaction Cost savings Increased Productivity
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Device Proliferation Entitlement Strategy Security Support Policy Management and Communication Enterprise Apps, Collaboration, Productivity Services etc. *2 year comparison
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Industry BYOD Spectrum Environment Requires Tight Controls Corp Only Device Manufacturing Environment Trading Floor Classified Government Networks Traditional Enterprise Focus on Basic Services, Easy Access Broader Device Types but Internet Only Educational Environments Public Institutions Simple Guest Enable Differentiated Services, On-Boarding with Security Onsite/Offsite Multiple Device Types + Access Methods Early BYOD Enterprise Adopters Corp Native Applications, New Services, Full Control Any Device, Any Ownership Innovative Enterprises Retail on Demand Mobile Sales Services (Video, Collaboration, etc.) LIMITADVANCEDENHANCEDBASIC
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Any Trusted Device Industry Standard Platforms Cisco AnyConnect and MDM Scaled Architecture Employee Purchased Devices Corporate and Personal Service Strong Rules of Use Flexible Liability Circular Business Client Choice Any Device Plans Competitive Market Spend Management SP Choice Self-Service Content One to Many Interactive Traditional One to One Tailored Support
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Architectural Principles Device security posture assurance User authentication and authorization Secure storage of corporate data at rest Execution Elements Policy Enforcement Local Access Control Device Encryption Remote Wipe * Inventory Tracking Asset Management Device Registration Device Identification User Audit Trail Forensic Capabilities
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 time
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 RegisterRegister ProfileProfile PosturePosture Enforce ment Internet Only Networking (ION) Core Network (Corporate Wifi) Guest Network Cloud Services ManagementManagement 4 Digit PIN PIN 10 Minute Timeout RemoteWipeRemoteWipe EncryptionEncryption
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Remote Access /VPN (Hardware & Software) WIRELESSWIRED
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Thank you.
1 Video Cloud for Business Enterprises Geng Lin CTO, IBM Alliance Cisco Systems P2P & Cloud Media Summit Los Angeles, CA May 6, 2010 Geng Lin CTO, IBM.
Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Leap into Innovation 7 Cloud Facts You Can't Afford to Ignore James Lambe Canadian Director, Google Enterprise.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
Avaya – Proprietary. Use pursuant to the terms of your signed agreement or Company policy. idEngines® Avaya Identity Engines And Mobile Device Management.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Partner Summit 2011 Padmasree Warrior CTO and SVP/GM, Enterprise, Commercial.
Training solution for Mobile Workforce. People expect to consume content when and where they want to. Training for Mobile Workforce.
© 2013 Cisco and/or its affiliates. All rights reserved. 1 Director, IN-FM Cisco BYOD Smart Solution: Freedom, Flexibility & Choice to Work Your Way Lanre.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
CLOUD COMPUTING. It is a collection of integrated and networked hardware, software and Internet infrastructure (called a platform). One can use.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Enterprise Mobility ‘Mobile First’ strategy for your Business
© 2021 SlidePlayer.com Inc. All rights reserved.