SlideShare a Scribd company logo
The Context Aware Network
A Holistic Approach to BYOD
Trends

             BYOD at Cisco
Bring Your
             Cisco® BYOD Solution
Own Device
             Use Cases

             Summary
Trends
         #CiscoPlusCA
Demand for Mobility

         15 billion                      56%
         new networked mobile       of information workers
           devices by 2015           spend time working
                                   OUTSIDE THE OFFICE




               3/4
          of employees uses             100%
         MULTIPLE DEVICES           of IT staff STRUGGLE
               for work         to keep up with mobile needs
BYOD: An Enterprise Wide Project

                                                  Network
                     Compliance                    Team
                     Operations




                                                       Endpoint
                                                        Team
         Security
        Operations




                        Application
                          Team

                                       Human
                                      Resources
A New Approach Is Required


                                                Routes All Requests
            Sources All Data
                               Handles All Devices



          Shapes All Streams                         Controls All Flows
                                     Touches All Users
               Sees All Traffic



                                                                          7
Cisco Unique BYOD Value Proposition
One Network, One Policy, One Management




    More Than Just
                          Device ownership is irrelevant: corporate, personal, guest, etc…
   Personal Devices

    More Than Just
                          BYO devices need wired, wireless, remote and mobile access
    Wireless Access

                          BYO devices can be any device: Windows PCs, Mac OS devices,
 More Than Just iPads     any tablet, any smartphone, gaming consoles, printers…etc
BYOD at Cisco




                #CiscoPlusCA
Cisco-On-Cisco Client Mix



                                                 2,104
                                 73M online       Cius   8,144
                                  meetings/yr.            iPad
                                                                    12,290
                 6,700+                                          BlackBerry Devices               2,185
                                                                   -1.6% Growth                 Other Devices
                Linux Desktops
                                                                                                -3.8% Growth




   87,000+
  Windows PCs
                                                                                         5,234
                                                                                      Android Devices
                                                                                       9.5% Growth
                   12,000+
                    Apple Macs                                      20,581
                                                                      iPhones
                                                                   3.9% Growth
Cisco-On-Cisco Realized Gain




          59%             32%          20%
        more devices     more users   fewer cases
Cisco BYOD Solution
                      #CiscoPlusCA
BYOD Spectrum
Where are you on this BYOD spectrum?




           Limit                       Basic                    Enhanced                     Advanced

    Environment requires       Focus on basic services      Enable differentiated         Company’s native
        tight controls           and easy access for      services and on-boarding        applications, new
                                   almost anybody         with security both onsite    services, and full control
                                                                 and offsite
       Company’s only
             device            Broader device types but                                 Multiple device types,
         Manufacturing              Internet only         Multiple device types plus       company issued
          environments          Education environments         access methods            Innovative enterprises
         Trading floors            Public institutions            Healthcare               Retail on demand
     Classified government          Simple guests           Early BYOD adopters
                                                                                          Mobile sales services
             networks                                      Contractor enablement       (video, collaboration, etc.)
     Traditional enterprises
400 IT professionals interviewed about BYOD, more than 65 percent
said they don't have the necessary tools in place to manage personal
devices on the corporate network, and 27 percent said they aren’t
certain of all the personal devices that are accessing the network.




                                                                #CiscoPlusCA
Cisco BYOD Smart Solution Elements


                       Collaboration Application


        Policy Management                 Central Management


        Core Infrastructure                    Secure Mobility
Cisco Switching Differentiators for BYOD
Cisco Switches Scale to Meet Diverse Deployment Scenarios
              Next Generation Workspace
                                                               Cisco Switching Differentiators
                                                               • Unique Support of Next Generation Workspace
                                                                 populated by smartphones, tablets and virtual
       Any Device           HD Video           VDI
                                                                 desktops
                                                               • Support Widest Range of Devices
                                                               • Prevent eavesdropping and facilitate
        Catalyst 3K-X                   Catalyst 4K              compliance with MACSec Encryption
                                                               • Device profilers and device Sensors, Deliver
                                    PoE           High           Consistent Policy
   Security         Video
                                 Leadership     Availability
                                                               • Monitor mode greatly simplifies 802.1x
                     Smart Operations                            deployments

                        Lower TCO

               Enabling the BYOD Experience
Cisco Wireless Technology for BYOD
Cisco Mobility Technology for High Performance Wireless Network
    Best-of-Breed Mobility Technology




      AP3600                         Clean Air                 ClientLink 2.0            VideoStream
      Access Point Innovation        Improved Performance      Improved Performance      Improved Performance
      The Tablet AP, Enhanced        Proactive and automatic   Proactive and automatic   Wired multicast over a
      throughput and coverage        interference mitigation   beamforming               Wireless network
      targeting advanced
      applications for tablets and                             For 802.11n and legacy
      smart devices                                            clients



                  Identity Services Engine (ISE) - Unified Policy Management
                               Prime NCS – Central Network Management
Universal Management for BYOD Deployments
Cisco Prime NCS for Unified Network Management

           Converged Access Management for Wired and Wireless Networks
                                         Wireless | Wired | Security Policy | Network Services


 Converged Security and Policy Monitoring
 Contextual status and monitoring across wired & wireless networks



 Centrally Organizes Day 1-to-n Management tasks
 Instructional configuration workflows



 Reduces the Time to Troubleshoot
 Integration with Cisco NCS Prime




Improved Network Visibility                    -    Faster Troubleshooting         -   Eliminate Configuration Errors
TrustSec Architecture

Identity and Context Centric Security


                    WHERE
                                                                                             Business-Relevant
         WHAT                  WHEN                                                               Policies
                                            Security Policy
      WHO                             HOW   Attributes
                                                                 Centralized Policy Engine
                                                              Dynamic Policy & Enforcement

                    Identity




                User and Devices                    SECURITY POLICY   MONITORING AND     APPLICATION
                                                     ENFORCEMENT        REPORTING         CONTROLS
Policy: Who, What, Where, When, How

Identity Services Engine (ISE) for Advanced Policy Management


       IDENTITY                                                                                                                   PROFILING
                             1
                                                                   ISE
                                                                                                                                       HTTP
                        802.1x EAP                                                                                                  NETFLOW
                           User
                       Authentication                                                                                                  SNMP
                                                                               VLAN 10                                                  DNS
                                             2                                 VLAN 20                                               RADIUS
                                              Profiling to
                                              identify device                                                  Corporate               DHCP
                         Company
                          asset                                                                                Resources
           HQ                                                                            4


                                                                Wireless LAN
                                                                 Controller        Policy
           2:38pm                                                                 Decision
                                                                                                              Internet Only

                          Person              3                                                    5
                                                                                                                        6
                             al
                           asset           Posture                                           Enforce policy
                                        of the device                                        in the network     Full or partial
                                                                Unified Access                                  access granted
                                                                 Management
Simplified On-Boarding for BYOD

Putting the End User in Control

 • Reduced Burden on IT staff
      – Device On-Boarding
      – Self Registration
      – Supplicant Provisioning

 • Reduced Burden on Help Desk Staff
      – Seamless, Intuitive User Experience

 • Self Service Model
      – My Device Registration Portal
      – Guest Sponsorship Portal
Device Authentication
  Leveraging Your Infrastructure Network

                                  Cisco Catalyst® Switch
                                                                             Identity Differentiators
                                                                             Monitor Mode

                                                                             Flexible Authentication Sequence

                                                                             IP Telephony Support

                                                                             Support for Virtual Desktop
                                                           Guests
                                                                             Environments
Authorized    Tablets IP Phones       Network Device
  Users
             802.1X                MAB and Profiling       Web Auth

                                                   Authentication Features
                       IEEE 802.1x                     MAC Auth Bypass          Web Authentication

                 Consistent identity features supported on all Catalyst switch models
Device Profiling
Automated Device Classification Using Cisco Infrastructure                                                                    Cisco
                                                                                                                            Innovation
                                                          DEVICE PROFILING
                                               Profiling for both wired and wireless devices


                                                                           POLICY

                                                      Printer                              Personal iPad
                                                                            ISE
              Access Point                                                                                           Personal
           Printer Policy                                     CDP                       CDP
                                                                                                                    iPad Policy
                                                              LLDP                      LLDP
                                                              DHCP                      DHCP
                                                              MAC                       MAC
          [place on VLAN X]                                                                                     [restricted access]
                                                                                                     Access
                                                                                                      Point




The Solution                 DEPLOYMENT SCENARIO WITH CISCO IOS SENSOR
Efficient Device             COLLECTION                              CLASSIFICATION                           AUTHORIZATION
Classification Leveraging    Switch Collects Device Related          ISE Classifies Device, Collects          ISE Executes Policy Based on
                             Data and Sends Report to ISE            Flow Information and Provides Device     User and Device
Infrastructure                                                       Usage Report
Device Posture Assessment
ISE Posture Ensures Endpoint Health before Network Access

Wired, Wireless,
    VN User


                                                                                             Temporary Limited Network
                   Non-
                                                                                             Access Until Remediation Is
                 Compliant
                                                                                                     Complete




  Sample Employee Policy:            Challenge:                                Value:
  • Microsoft patches updated        • Understanding health of device          • Temporal (web-based) or
  • McAfee AV installed, running,                                                Persistent Agent
                                     • Varying level of control over devices
    and current                                                                • Automatic Remediation
                                     • Cost of Remediation
  • Corp asset checks                                                          • Differentiated policy enforcement-
  • Enterprise application running                                               based on role
Guest Management
ISE Guest Service for Managing Guests


 Guest Policy             Web Authentication


                                                                                       Internet
 Wireless or Wired
                                 Guests
      Access

Internet-Only Access




       Provision:                Manage:                       Notify:                 Report:
   Guest Accounts via       Sponsor Privileges,        Guests of Account Details   On All Aspects of
    Sponsor Portal      Guest Accounts and Policies,    by Print, Email, or SMS    Guest Accounts
                               Guest Portal
Extended Security on and off-premise
AnyConnect, ASA, IPS, WSA & ScanSafe

                                                  Cisco Cloud
                                                  and Web Security




                            Information Sharing
                          Between ASA and WSA




                  ASA &
                   IPS                                Cisco Web
  Users Outside                                    Security Appliance
    Network                                                             Social Networking
                                                                        Enterprise SaaS
                                        Corporate AD
                                                                             Email
                                                                             News
Remote Access: Cisco AnyConnect
Optimized User Mobility

•   User friendly design
•   Industry-leading connectivity features
•   Integrated connection manager
    for enhanced security
•   Key Features:
      •   Always On or On-Demand VPN
      •   Auto Re-Connect (Persistence)
      •   IPSec, SSL & DTLS VPN
      •   Clientless WebVPN
      •   Optimal Gateway Selection
      •   Endpoint Posture Assessment
Device Management
MDM & Cisco Solutions

     MDM Partners                                                               Cisco
      Device inventory                        User/device            Threat defense           Secure remote access
                                                authentication
      Device provisioning/de-provisioning                             Web usage policy
                                               Posture assessment
      Device data security                                            Web application
                                               Policy enforcement      DLP
      Device application security
                                               Context aware
      Cost management
                                                access control
      Full or selective device remote wipe


                                                      ISE            ScanSafe   WSA       IPS     AnyConnect   ASA
Simple BYOD Deployment Diagram
Tying all the pieces together
                                 NCS Prime                ISE
                                                                              MDM Manager




                                                                                       3rd Party
                                                                                       MDM Appliance


              Cisco
            Catalyst
           Switches                             Cisco                                ASA
                                               WLAN                                   Firewall
                                             Controller

                                                                      CSM /
                           Wired                                      ASDM
                           Network
                           Devices




           Office Wired Access               Office Wireless Access           Remote Access
Advanced Collaboration with Cisco Jabber



   Win, Mac         iPad, Cius      Smartphone   Web
WebEx: Industry-Leading Meeting Solutions




Industry-leading       Document,         Integrated with       Delivered Securely    Consistent,
Web Conferencing       Application,      TelePresence and      Over Cisco            Cross-Platform
                       Desktop Sharing   Jabber for Enhanced   Collaboration Cloud   Experience
• Audio, web, and
  high-quality video                     Collaboration                               • Windows, Mac,
                                                                                       Linux, Unix, Solaris
• Meeting, Training,
  Event, and Support                                                                 • Supported on
  versions                                                                             leading mobile
                                                                                       devices
                                                                                     • Available in
                                                                                       13 languages
Use Cases
            #CiscoPlusCA
BYOD Use Case: Basic Implementation

      Business Policy: Enable Wired and Wireless Access for Company and Personal Devices

Unified Policy-Based Management         Uncompromised Security                     Simplified On-Boarding
• Provide identity-aware networking     •   Provide secure, scalable guest         • Provide zero-touch device
  and data integrity                        access solutions                         registration and provisioning of
• Universally and effectively control                                                employee and guest devices
                                        •   Authenticate users and endpoints
  user and device access
                                            through wired wireless access with
                                            consistent policy across the
                                            enterprise network



                                                                                 Cisco®                Cisco
                        Wireless                  Wired                                                Prime™
                                                                                 ISE                   NCS
                          Smartphones   Tablets           Games and      Thin and Virtual   Desktop/Notebooks
                                                           Printers          Clients
        Devices Layer
BYOD Use Case: Advanced Implementation

  Business Policy: Provide Granular Access to Full Company Workspace, Both On and Off Site

                              Enable a Full Mobile and Collaboration Experience
     Provide integrated policy management with mobile device management, deliver granular endpoint controls,
                 provide layered security, and enforce network security policies for BYOD deployments


              Cisco WebEx                 Cisco                  Cisco
              ®                           Jabber™                Quad™                      Enterprise Applications



        Cisco
     AnyConnect™       Cisco ® ScanSafe    Cisco WSA Cisco ASA
                                                                          Cisco ISE               Cisco Prime™ NCS
             Router                 Wireless               Wired

                      Smartphones         Tablets      Games and         Thin and Virtual      Desktop and Notebook
                                                        Printers             Clients                Computers
     Devices Layer
Summary




          #CiscoPlusCA
Embrace Mobility While Ensuring Security
Some Questions to Answer

                 Do I have the WLAN capacity and reliability to support an
                  increased number of mobile devices and future applications?
                 How do I enforce security policies on noncompliant devices?
                 How do I grant different levels of access to protect my
                  network?
                 How do I help ensure data loss prevention on devices for
                  which I do not have visibility?
                 How do I mitigate emerging threats targeted
                  at mobile devices?
                 How do I monitor and troubleshoot user and
                  client connectivity problems on my access
                  (wired and wireless) network?
                 Is my network capable of delivering the scalability and
                  performance required to achieve the benefits
                  of a BYOD strategy?
Looking Ahead
Is the Network Ready for Next Generation Applications?



                                                         Mobile BYOD clients drive
                                                         advanced applications for
                                                         Voice, Video, and VXI
                    Before: 1 Employee =
                            1 PC                         Next Generation Applications
                                                         require more bandwidth and
                                                         performance




           Tomorrow:Infrastructure3 or more
            Network Employee =Applications
            Today: 1 Multimedia Will Have
                = High To Scale Use
                        Devices
                        Bandwidth
Q&A


      #CiscoPlusCA
We value your feedback.
Please be sure to complete the Evaluation Form for this session.


       Access today’s presentations at cisco.com/ca/plus


       Follow @CiscoCanada and join the #CiscoPlusCA conversation

More Related Content

PPTX
Ise 1 2-bdm-v4
PDF
Demystifying TrustSec, Identity, NAC and ISE
PDF
Identity Services Engine Overview and Update
PPTX
Cisco Identity Services Engine (ISE)
PDF
Cisco Trustsec & Security Group Tagging
PDF
Enterprise Edge Security with Cisco ISE
PPTX
From Cisco ACS to ISE
PPTX
Sem cis ise
Ise 1 2-bdm-v4
Demystifying TrustSec, Identity, NAC and ISE
Identity Services Engine Overview and Update
Cisco Identity Services Engine (ISE)
Cisco Trustsec & Security Group Tagging
Enterprise Edge Security with Cisco ISE
From Cisco ACS to ISE
Sem cis ise

What's hot (20)

PPTX
TechWiseTV Workshop: Cisco ONE
PPSX
ISE_Pub
PDF
Security As A Service
PPTX
Safenet Authentication Service, SAS
PPTX
Cisco one partner roadshow cisco one smart licensing v10
PDF
Open APIs + Software Competitions = Innovative & Creative Solutions
PDF
John Merline - How make your cloud SASE
PPTX
Con8902 developing secure mobile applications-final
PPTX
Remote Working Webinar (Episode 4)
PPTX
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
PDF
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
PDF
Cisco connect winnipeg 2018 simply powerful networking with meraki
PDF
Bridging the Enterprise and the Cloud from Layer 7
PDF
Dev004103
PDF
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
PDF
Overview of Identity and Access Management Product Line
PDF
Remote Workers Webinar (Episode 3)
PPTX
Cisco connect winnipeg 2018 simple it leads to simple it management
PDF
Hitachi ID Group Manager
PDF
Hitachi ID Password Manager Brochure
TechWiseTV Workshop: Cisco ONE
ISE_Pub
Security As A Service
Safenet Authentication Service, SAS
Cisco one partner roadshow cisco one smart licensing v10
Open APIs + Software Competitions = Innovative & Creative Solutions
John Merline - How make your cloud SASE
Con8902 developing secure mobile applications-final
Remote Working Webinar (Episode 4)
NIC 2017 Azure AD Identity Protection and Conditional Access: Using the Micro...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
Cisco connect winnipeg 2018 simply powerful networking with meraki
Bridging the Enterprise and the Cloud from Layer 7
Dev004103
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Overview of Identity and Access Management Product Line
Remote Workers Webinar (Episode 3)
Cisco connect winnipeg 2018 simple it leads to simple it management
Hitachi ID Group Manager
Hitachi ID Password Manager Brochure
Ad

Similar to The Context Aware Network A Holistic Approach to BYOD (20)

PPTX
Beyond BYOD
PDF
Flexible workstyle windows roadmap for solution day matthew hardman
PPTX
Beyond BYOD: Uncompromised Experience for Any Workspace
PPTX
Bcs presentation zacharias_enislidis
PDF
Cisco switching technical
PPTX
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
PPTX
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
PDF
Making BYOD Work for Your Organization
PPTX
ReadyCloud Collaboration, a Cisco Powered service
PDF
The New Collaboration Technologies Experience
PDF
Webinar: Mobile Device Management
PDF
Mobile device management
PPTX
Express Data - BYOD
PPTX
Express Data - BYOD
PDF
Five_Steps_to_Consumerization
PDF
Aerohive whitepaper-byod-and-beyond
 
PDF
Is Your Network Ready for BYOD?
PPTX
Solutions for SMEs in Hong Kong
PPTX
XEN App
PPTX
Mobile Management
Beyond BYOD
Flexible workstyle windows roadmap for solution day matthew hardman
Beyond BYOD: Uncompromised Experience for Any Workspace
Bcs presentation zacharias_enislidis
Cisco switching technical
Peregrine Guard - An Enterprise Mobile Security Product by i7 Networks
Scot Hull with Cisco - Beyond BYOD -- Stalwart Executive Briefing 2012
Making BYOD Work for Your Organization
ReadyCloud Collaboration, a Cisco Powered service
The New Collaboration Technologies Experience
Webinar: Mobile Device Management
Mobile device management
Express Data - BYOD
Express Data - BYOD
Five_Steps_to_Consumerization
Aerohive whitepaper-byod-and-beyond
 
Is Your Network Ready for BYOD?
Solutions for SMEs in Hong Kong
XEN App
Mobile Management
Ad

More from Cisco Canada (20)

PDF
Cisco connect montreal 2018 net devops
PDF
Cisco connect montreal 2018 iot demo kinetic fr
PPTX
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
PDF
Cisco connect montreal 2018 vision mondiale analyse locale
PDF
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
PDF
Cisco connect montreal 2018 collaboration les services webex hybrides
PDF
Integration cisco et microsoft connect montreal 2018
PDF
Cisco connect montreal 2018 compute v final
PDF
Cisco connect montreal 2018 saalvare md-program-xr-v2
PDF
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
PDF
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect Toronto 2018 DevNet Overview
PDF
Cisco Connect Toronto 2018 DNA assurance
PDF
Cisco Connect Toronto 2018 network-slicing
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco Connect Toronto 2018 sixty to zero
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco connect montreal 2018 collaboration les services webex hybrides
Integration cisco et microsoft connect montreal 2018
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 sixty to zero

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Approach and Philosophy of On baking technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Approach and Philosophy of On baking technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
20250228 LYD VKU AI Blended-Learning.pptx
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
Reach Out and Touch Someone: Haptics and Empathic Computing

The Context Aware Network A Holistic Approach to BYOD

  • 1. The Context Aware Network A Holistic Approach to BYOD
  • 2. Trends BYOD at Cisco Bring Your Cisco® BYOD Solution Own Device Use Cases Summary
  • 3. Trends #CiscoPlusCA
  • 4. Demand for Mobility 15 billion 56% new networked mobile of information workers devices by 2015 spend time working OUTSIDE THE OFFICE 3/4 of employees uses 100% MULTIPLE DEVICES of IT staff STRUGGLE for work to keep up with mobile needs
  • 5. BYOD: An Enterprise Wide Project Network Compliance Team Operations Endpoint Team Security Operations Application Team Human Resources
  • 6. A New Approach Is Required Routes All Requests Sources All Data Handles All Devices Shapes All Streams Controls All Flows Touches All Users Sees All Traffic 7
  • 7. Cisco Unique BYOD Value Proposition One Network, One Policy, One Management More Than Just Device ownership is irrelevant: corporate, personal, guest, etc… Personal Devices More Than Just BYO devices need wired, wireless, remote and mobile access Wireless Access BYO devices can be any device: Windows PCs, Mac OS devices, More Than Just iPads any tablet, any smartphone, gaming consoles, printers…etc
  • 8. BYOD at Cisco #CiscoPlusCA
  • 9. Cisco-On-Cisco Client Mix 2,104 73M online Cius 8,144 meetings/yr. iPad 12,290 6,700+ BlackBerry Devices 2,185 -1.6% Growth Other Devices Linux Desktops -3.8% Growth 87,000+ Windows PCs 5,234 Android Devices 9.5% Growth 12,000+ Apple Macs 20,581 iPhones 3.9% Growth
  • 10. Cisco-On-Cisco Realized Gain 59% 32% 20% more devices more users fewer cases
  • 11. Cisco BYOD Solution #CiscoPlusCA
  • 12. BYOD Spectrum Where are you on this BYOD spectrum? Limit Basic Enhanced Advanced Environment requires Focus on basic services Enable differentiated Company’s native tight controls and easy access for services and on-boarding applications, new almost anybody with security both onsite services, and full control and offsite Company’s only device Broader device types but Multiple device types, Manufacturing Internet only Multiple device types plus company issued environments Education environments access methods Innovative enterprises Trading floors Public institutions Healthcare Retail on demand Classified government Simple guests Early BYOD adopters Mobile sales services networks Contractor enablement (video, collaboration, etc.) Traditional enterprises
  • 13. 400 IT professionals interviewed about BYOD, more than 65 percent said they don't have the necessary tools in place to manage personal devices on the corporate network, and 27 percent said they aren’t certain of all the personal devices that are accessing the network. #CiscoPlusCA
  • 14. Cisco BYOD Smart Solution Elements Collaboration Application Policy Management Central Management Core Infrastructure Secure Mobility
  • 15. Cisco Switching Differentiators for BYOD Cisco Switches Scale to Meet Diverse Deployment Scenarios Next Generation Workspace Cisco Switching Differentiators • Unique Support of Next Generation Workspace populated by smartphones, tablets and virtual Any Device HD Video VDI desktops • Support Widest Range of Devices • Prevent eavesdropping and facilitate Catalyst 3K-X Catalyst 4K compliance with MACSec Encryption • Device profilers and device Sensors, Deliver PoE High Consistent Policy Security Video Leadership Availability • Monitor mode greatly simplifies 802.1x Smart Operations deployments Lower TCO Enabling the BYOD Experience
  • 16. Cisco Wireless Technology for BYOD Cisco Mobility Technology for High Performance Wireless Network Best-of-Breed Mobility Technology AP3600 Clean Air ClientLink 2.0 VideoStream Access Point Innovation Improved Performance Improved Performance Improved Performance The Tablet AP, Enhanced Proactive and automatic Proactive and automatic Wired multicast over a throughput and coverage interference mitigation beamforming Wireless network targeting advanced applications for tablets and For 802.11n and legacy smart devices clients Identity Services Engine (ISE) - Unified Policy Management Prime NCS – Central Network Management
  • 17. Universal Management for BYOD Deployments Cisco Prime NCS for Unified Network Management Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services Converged Security and Policy Monitoring Contextual status and monitoring across wired & wireless networks Centrally Organizes Day 1-to-n Management tasks Instructional configuration workflows Reduces the Time to Troubleshoot Integration with Cisco NCS Prime Improved Network Visibility - Faster Troubleshooting - Eliminate Configuration Errors
  • 18. TrustSec Architecture Identity and Context Centric Security WHERE Business-Relevant WHAT WHEN Policies Security Policy WHO HOW Attributes Centralized Policy Engine Dynamic Policy & Enforcement Identity User and Devices SECURITY POLICY MONITORING AND APPLICATION ENFORCEMENT REPORTING CONTROLS
  • 19. Policy: Who, What, Where, When, How Identity Services Engine (ISE) for Advanced Policy Management IDENTITY PROFILING 1 ISE HTTP 802.1x EAP NETFLOW User Authentication SNMP VLAN 10 DNS 2 VLAN 20 RADIUS Profiling to identify device Corporate DHCP Company asset Resources HQ 4 Wireless LAN Controller Policy 2:38pm Decision Internet Only Person 3 5 6 al asset Posture Enforce policy of the device in the network Full or partial Unified Access access granted Management
  • 20. Simplified On-Boarding for BYOD Putting the End User in Control • Reduced Burden on IT staff – Device On-Boarding – Self Registration – Supplicant Provisioning • Reduced Burden on Help Desk Staff – Seamless, Intuitive User Experience • Self Service Model – My Device Registration Portal – Guest Sponsorship Portal
  • 21. Device Authentication Leveraging Your Infrastructure Network Cisco Catalyst® Switch Identity Differentiators Monitor Mode Flexible Authentication Sequence IP Telephony Support Support for Virtual Desktop Guests Environments Authorized Tablets IP Phones Network Device Users 802.1X MAB and Profiling Web Auth Authentication Features IEEE 802.1x MAC Auth Bypass Web Authentication Consistent identity features supported on all Catalyst switch models
  • 22. Device Profiling Automated Device Classification Using Cisco Infrastructure Cisco Innovation DEVICE PROFILING Profiling for both wired and wireless devices POLICY Printer Personal iPad ISE Access Point Personal Printer Policy CDP CDP iPad Policy LLDP LLDP DHCP DHCP MAC MAC [place on VLAN X] [restricted access] Access Point The Solution DEPLOYMENT SCENARIO WITH CISCO IOS SENSOR Efficient Device COLLECTION CLASSIFICATION AUTHORIZATION Classification Leveraging Switch Collects Device Related ISE Classifies Device, Collects ISE Executes Policy Based on Data and Sends Report to ISE Flow Information and Provides Device User and Device Infrastructure Usage Report
  • 23. Device Posture Assessment ISE Posture Ensures Endpoint Health before Network Access Wired, Wireless, VN User Temporary Limited Network Non- Access Until Remediation Is Compliant Complete Sample Employee Policy: Challenge: Value: • Microsoft patches updated • Understanding health of device • Temporal (web-based) or • McAfee AV installed, running, Persistent Agent • Varying level of control over devices and current • Automatic Remediation • Cost of Remediation • Corp asset checks • Differentiated policy enforcement- • Enterprise application running based on role
  • 24. Guest Management ISE Guest Service for Managing Guests Guest Policy Web Authentication Internet Wireless or Wired Guests Access Internet-Only Access Provision: Manage: Notify: Report: Guest Accounts via Sponsor Privileges, Guests of Account Details On All Aspects of Sponsor Portal Guest Accounts and Policies, by Print, Email, or SMS Guest Accounts Guest Portal
  • 25. Extended Security on and off-premise AnyConnect, ASA, IPS, WSA & ScanSafe Cisco Cloud and Web Security Information Sharing Between ASA and WSA ASA & IPS Cisco Web Users Outside Security Appliance Network Social Networking Enterprise SaaS Corporate AD Email News
  • 26. Remote Access: Cisco AnyConnect Optimized User Mobility • User friendly design • Industry-leading connectivity features • Integrated connection manager for enhanced security • Key Features: • Always On or On-Demand VPN • Auto Re-Connect (Persistence) • IPSec, SSL & DTLS VPN • Clientless WebVPN • Optimal Gateway Selection • Endpoint Posture Assessment
  • 27. Device Management MDM & Cisco Solutions MDM Partners Cisco  Device inventory  User/device  Threat defense  Secure remote access authentication  Device provisioning/de-provisioning  Web usage policy  Posture assessment  Device data security  Web application  Policy enforcement DLP  Device application security  Context aware  Cost management access control  Full or selective device remote wipe ISE ScanSafe WSA IPS AnyConnect ASA
  • 28. Simple BYOD Deployment Diagram Tying all the pieces together NCS Prime ISE MDM Manager 3rd Party MDM Appliance Cisco Catalyst Switches Cisco ASA WLAN Firewall Controller CSM / Wired ASDM Network Devices Office Wired Access Office Wireless Access Remote Access
  • 29. Advanced Collaboration with Cisco Jabber Win, Mac iPad, Cius Smartphone Web
  • 30. WebEx: Industry-Leading Meeting Solutions Industry-leading Document, Integrated with Delivered Securely Consistent, Web Conferencing Application, TelePresence and Over Cisco Cross-Platform Desktop Sharing Jabber for Enhanced Collaboration Cloud Experience • Audio, web, and high-quality video Collaboration • Windows, Mac, Linux, Unix, Solaris • Meeting, Training, Event, and Support • Supported on versions leading mobile devices • Available in 13 languages
  • 31. Use Cases #CiscoPlusCA
  • 32. BYOD Use Case: Basic Implementation Business Policy: Enable Wired and Wireless Access for Company and Personal Devices Unified Policy-Based Management Uncompromised Security Simplified On-Boarding • Provide identity-aware networking • Provide secure, scalable guest • Provide zero-touch device and data integrity access solutions registration and provisioning of • Universally and effectively control employee and guest devices • Authenticate users and endpoints user and device access through wired wireless access with consistent policy across the enterprise network Cisco® Cisco Wireless Wired Prime™ ISE NCS Smartphones Tablets Games and Thin and Virtual Desktop/Notebooks Printers Clients Devices Layer
  • 33. BYOD Use Case: Advanced Implementation Business Policy: Provide Granular Access to Full Company Workspace, Both On and Off Site Enable a Full Mobile and Collaboration Experience Provide integrated policy management with mobile device management, deliver granular endpoint controls, provide layered security, and enforce network security policies for BYOD deployments Cisco WebEx Cisco Cisco ® Jabber™ Quad™ Enterprise Applications Cisco AnyConnect™ Cisco ® ScanSafe Cisco WSA Cisco ASA Cisco ISE Cisco Prime™ NCS Router Wireless Wired Smartphones Tablets Games and Thin and Virtual Desktop and Notebook Printers Clients Computers Devices Layer
  • 34. Summary #CiscoPlusCA
  • 35. Embrace Mobility While Ensuring Security Some Questions to Answer  Do I have the WLAN capacity and reliability to support an increased number of mobile devices and future applications?  How do I enforce security policies on noncompliant devices?  How do I grant different levels of access to protect my network?  How do I help ensure data loss prevention on devices for which I do not have visibility?  How do I mitigate emerging threats targeted at mobile devices?  How do I monitor and troubleshoot user and client connectivity problems on my access (wired and wireless) network?  Is my network capable of delivering the scalability and performance required to achieve the benefits of a BYOD strategy?
  • 36. Looking Ahead Is the Network Ready for Next Generation Applications? Mobile BYOD clients drive advanced applications for Voice, Video, and VXI Before: 1 Employee = 1 PC Next Generation Applications require more bandwidth and performance Tomorrow:Infrastructure3 or more Network Employee =Applications Today: 1 Multimedia Will Have = High To Scale Use Devices Bandwidth
  • 37. Q&A #CiscoPlusCA
  • 38. We value your feedback. Please be sure to complete the Evaluation Form for this session. Access today’s presentations at cisco.com/ca/plus Follow @CiscoCanada and join the #CiscoPlusCA conversation