SlideShare une entreprise Scribd logo
1  sur  39
March 22, 2011 iPad. Galaxy. Cius. Best Practices to Support the influx of Mobile Devices
Agenda 2 1 User Transition to Mobile Tablets and Devices Best practices and tips for enabling reliable and secure mobile device access Best practices and tips for enabling reliable and secure mobile device access
Your Users Have New ExpectationsThe Evolving Workplace Landscape NEW SCHOOL OLD SCHOOL ,[object Object]
Work is a function —Globally dispersed, mixed device ownership
Change in IT control and management paradigm
Enterprise provided mobile devices
Work is a place you go to—limited off campus access
IT visibility and control into user devices and applicationsExecutive Employee IT
The Transformation Of The Desktop Driven by Demand for Mobility Traditional Revolutionize Modernized Centralized provisioning, management and security for users and applications Apps Apps Virtual Apps Virtual Apps Virtual Apps Virtual Apps WinXP WinXP Thick Client HVD HVD HVD ZeroClient Thin Client Mobile Client Virtualized Platforms
Key Market FindingsMobility Is Here to Stay 32% 50% Employees globally rely on more than one mobile data device during their typical workday Global enterprises consider WLAN as mission critical to operations
Key Market FindingsThe Challenge Is to Ensure Network Performance and Security 32% 74% 40% 57% Employees use unmanaged devices on their corporate network IT staff—security  the biggest challenge
Embrace Mobility. Address Security.Some Questions to Consider Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information?
Best practices and tips:Providing a reliable and high performance wireless network
Follow these steps:  Start Migration to 802.11n to Enhance Network Performance 1 2 3 4 5 6 Design your Cisco 802.11n Network to Optimize Rich Media on Mobile Devices Properly Configure for High Density Wireless Deployments Improve Reliability and Coverage with Cisco ClientLink Detect and Mitigate RF Interference with Cisco CleanAir Improve Video Applications with VideoStream Implement Cisco Radio Resource Management
Step 1: Migrate to 802.11n to Enhance Network Performance Challenge ,[object Object],Advantage ,[object Object],7x higher throughput More reliable and predictable coverage ,[object Object],Primary 802.11n Components Multiple Input Multiple Output (MIMO) ,[object Object]
Beam forming
Spatial multiplexing 40 MHz Channels ,[object Object],Improved MAC Efficiency ,[object Object]
Block AcknowledgementsEnables Throughput and Coverage Needed to Scale Mobile Devices
Step 2: Configure for High Density   Wireless Deployments Challenge ,[object Object],Advantage ,[object Object],Assess the application’s Bandwidth Requirements Per user Define the supported wireless protocols—calculate required channels 132 36 48 60 100 149 104 116 64 52 44 36 Efficient RF Design Improves Coverage for Mobile Devices in Concentrated Areas
Step 2: Assess Application Bandwidth Requirements  ,[object Object],Determine the minimum acceptable throughput applications require—design for the highest bandwidth requirement ,[object Object]
This is the aggregate bandwidth you will require in your space
Divide the aggregate by the protocol throughput to determine number of channels required in the space,[object Object]
Step 3: Improve Reliability and Coverage with Cisco ClientLink Challenge ,[object Object],Advantage ,[object Object],802.11a/g 802.11a/g WithoutClientLink and Beam Forming WithClientLink and Beam Forming Up to 65% Increase in Throughput Up to 27% Improvement in Channel Capacity Existing 802.11n Solutions Beam Strength Not Directed to Client Increases Overall Wireless System Capacity in Mixed Client Environment
Step 3: Optimize the Installation Configure 2.4 GHz for 20MHz and three non-overlapping channels/cells Provides greater flexibility for access point placement for optimal coverage and capacity Disable lower data rates in 2.4GHz Encourage clients to use 5-GHz by enabling Cisco BandSelect BandSelect directs clients to 5 GHz optimizing RF usage Better usage of the higher capacity 5GHz band Frees up 2.4 GHz for single band clients Consider using DFS Channels—Supported by Cisco Cius , Apple iPad, Intel 5100/5300/6200/6300 radios Dual-Band Client Radio 2.4/5GHz  Discovery Probes Looking for AP Discovery     Response 2.4 5 802.11n
Step 4: Detect and Mitigate RF Interference with Cisco CleanAir Challenge ,[object Object],Advantage ,[object Object],Detects and classifies interference Locates problem sources Automatically avoids interference POOR GOOD CH 11 Maintain Air Quality CH 1 Improves Connectivity of Mobile Devices by Eliminating Impact of Interference
Step 5: Improve Video Applications with Cisco VideoStream Technology Challenge ,[object Object],Advantage ,[object Object],Primary 802.11n Components Stream Prioritization Resource Reservation Control MULTICAST STREAM VIDEO NOTAVAILABLE COMPANY ALL HANDS TRAINING PROGRAM AP AP AP WLC LIVE SPORTING EVENT UNICAST STREAMS Efficiently Scales Enterprise-Class Video Collaboration on Mobile Devices
Step 6: Implement Cisco Radio Resource Management  Challenge ,[object Object],Advantage ,[object Object],Access point channel assignments and output power Coverage hole compensation  ,[object Object],Access points at maximum power Configuration mismatches Channel changes/ change reason Coverage hole events Provides Quick Assessment and Adjustment of RF Environment for Enhanced Connectivity
Best practices and tips:Implementing mobile device policies and secure network access
Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I enforce security policies on non compliant devices? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
Flood of New Devices Which are corporate devices? What corporate data is on these devices? Security? Friend or Foe? Managed vs. UnManaged
Job Role Supply Partner Unmanaged desktop; complex support issues Requires limited access to corporate resources Employee Managed desktop; potentially unmanaged personal devices Full access for managed devices Contractor, Temp  Access requirementsvary greatly.  Unmanaged or managed devices; access needs to be limited Teleworker Managed desktop; unmanaged personal devices  Requires consistent LAN-like performance
Local LAN Access Policy Partial Corporate  LAN Access  Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
Local LAN Access Policy Partial Corporate  LAN Access  Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
Machine Access Restriction Solution Full Access or Deny Authentication User authentication must be proceeded by machine authentication Calling station ID database ACS 4.0 or greater Requires user and machine credentials Typically used with username/password Enterprise LAN
Active Directory/User Certificate Solution Authentication Maintain the existing username/password infrastructure for partial LAN access Deploy user certificates to all managed devices for local LAN or remote access authentication Certificates must be locked to the device Certificate Revocation List Web Enrollment Simple Certificate Enrollment Protocol (SCEP) Web Search: “Windows server certificate services”
Network Access Control Solution Profiling, Fingerprinting Watermarking Clientless Profiling using MAC OUI, DHCP, HTTP, DNS Customizable profiles Regular profile updates The RIGHT Person On the RIGHT Device In The RIGHT Way
Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
Global Threat Telemetry Global Threat Telemetry Cisco Security Intelligence Operation Cisco SensorBase Threat Operations Center Advanced Algorithms 8:10 GMT All Cisco Customers Protected Ad Agency HG in London Bank Branch in Chicago ISP Datacenter in Moscow 8:00 GMT Detects New Malware 8:03 GMT Sensor Detects Hacker Probing 8:07 GMT Sensor Detects New Botnet Higher Threat Coverage, Greater Accuracy, Proactive Protection
Threat Intelligence: SIO Network Security Access Control Secure Mobility Content Security Cisco Security Solutions Portfolio ASA,  ASA for Catalyst, VSG,  ASA with IPS,  IPS 4200,  ISR IOS security,  ASR,  CSM Access Control Server, TrustSec, NAC ASA SSL VPN,  ASA IPSEC VPN, Adaptive Wireless IPS, Cisco Virtual Office, AnyConnect IronPort Email Security Appliance,  IronPort Web Security Appliance,  ScanSafe Web Security Secure Cloud and Virtualization

Contenu connexe

En vedette

Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac ShiftCisco Mobility
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acCisco Mobility
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesCisco Mobility
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSCisco Mobility
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureCisco Mobility
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksCisco Mobility
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesCisco Mobility
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersCisco Mobility
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksCisco Mobility
 
Current Events Cisco III - Parr
Current Events Cisco III - ParrCurrent Events Cisco III - Parr
Current Events Cisco III - Parrguestf6708961
 

En vedette (19)

Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless Networks
 
4400
44004400
4400
 
Current Events Cisco III - Parr
Current Events Cisco III - ParrCurrent Events Cisco III - Parr
Current Events Cisco III - Parr
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
Iuwne10 S05 L01
Iuwne10 S05 L01Iuwne10 S05 L01
Iuwne10 S05 L01
 
Iuwne10 S02 L07
Iuwne10 S02 L07Iuwne10 S02 L07
Iuwne10 S02 L07
 
Iuwne10 S03 L03
Iuwne10 S03 L03Iuwne10 S03 L03
Iuwne10 S03 L03
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 

Plus de Cisco Mobility

Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolCisco Mobility
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco Mobility
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Cisco Mobility
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksCisco Mobility
 

Plus de Cisco Mobility (8)

Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Cisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case study
 
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
 

Dernier

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Support iPads, Tablets and Smartphones on your Wi-Fi: Best Practices

  • 1. March 22, 2011 iPad. Galaxy. Cius. Best Practices to Support the influx of Mobile Devices
  • 2. Agenda 2 1 User Transition to Mobile Tablets and Devices Best practices and tips for enabling reliable and secure mobile device access Best practices and tips for enabling reliable and secure mobile device access
  • 3.
  • 4. Work is a function —Globally dispersed, mixed device ownership
  • 5. Change in IT control and management paradigm
  • 7. Work is a place you go to—limited off campus access
  • 8. IT visibility and control into user devices and applicationsExecutive Employee IT
  • 9. The Transformation Of The Desktop Driven by Demand for Mobility Traditional Revolutionize Modernized Centralized provisioning, management and security for users and applications Apps Apps Virtual Apps Virtual Apps Virtual Apps Virtual Apps WinXP WinXP Thick Client HVD HVD HVD ZeroClient Thin Client Mobile Client Virtualized Platforms
  • 10. Key Market FindingsMobility Is Here to Stay 32% 50% Employees globally rely on more than one mobile data device during their typical workday Global enterprises consider WLAN as mission critical to operations
  • 11. Key Market FindingsThe Challenge Is to Ensure Network Performance and Security 32% 74% 40% 57% Employees use unmanaged devices on their corporate network IT staff—security the biggest challenge
  • 12. Embrace Mobility. Address Security.Some Questions to Consider Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information?
  • 13. Best practices and tips:Providing a reliable and high performance wireless network
  • 14. Follow these steps: Start Migration to 802.11n to Enhance Network Performance 1 2 3 4 5 6 Design your Cisco 802.11n Network to Optimize Rich Media on Mobile Devices Properly Configure for High Density Wireless Deployments Improve Reliability and Coverage with Cisco ClientLink Detect and Mitigate RF Interference with Cisco CleanAir Improve Video Applications with VideoStream Implement Cisco Radio Resource Management
  • 15.
  • 17.
  • 18. Block AcknowledgementsEnables Throughput and Coverage Needed to Scale Mobile Devices
  • 19.
  • 20.
  • 21. This is the aggregate bandwidth you will require in your space
  • 22.
  • 23.
  • 24. Step 3: Optimize the Installation Configure 2.4 GHz for 20MHz and three non-overlapping channels/cells Provides greater flexibility for access point placement for optimal coverage and capacity Disable lower data rates in 2.4GHz Encourage clients to use 5-GHz by enabling Cisco BandSelect BandSelect directs clients to 5 GHz optimizing RF usage Better usage of the higher capacity 5GHz band Frees up 2.4 GHz for single band clients Consider using DFS Channels—Supported by Cisco Cius , Apple iPad, Intel 5100/5300/6200/6300 radios Dual-Band Client Radio 2.4/5GHz Discovery Probes Looking for AP Discovery Response 2.4 5 802.11n
  • 25.
  • 26.
  • 27.
  • 28. Best practices and tips:Implementing mobile device policies and secure network access
  • 29. Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I enforce security policies on non compliant devices? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
  • 30. Flood of New Devices Which are corporate devices? What corporate data is on these devices? Security? Friend or Foe? Managed vs. UnManaged
  • 31. Job Role Supply Partner Unmanaged desktop; complex support issues Requires limited access to corporate resources Employee Managed desktop; potentially unmanaged personal devices Full access for managed devices Contractor, Temp Access requirementsvary greatly. Unmanaged or managed devices; access needs to be limited Teleworker Managed desktop; unmanaged personal devices Requires consistent LAN-like performance
  • 32. Local LAN Access Policy Partial Corporate LAN Access Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
  • 33. Local LAN Access Policy Partial Corporate LAN Access Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
  • 34. Machine Access Restriction Solution Full Access or Deny Authentication User authentication must be proceeded by machine authentication Calling station ID database ACS 4.0 or greater Requires user and machine credentials Typically used with username/password Enterprise LAN
  • 35. Active Directory/User Certificate Solution Authentication Maintain the existing username/password infrastructure for partial LAN access Deploy user certificates to all managed devices for local LAN or remote access authentication Certificates must be locked to the device Certificate Revocation List Web Enrollment Simple Certificate Enrollment Protocol (SCEP) Web Search: “Windows server certificate services”
  • 36. Network Access Control Solution Profiling, Fingerprinting Watermarking Clientless Profiling using MAC OUI, DHCP, HTTP, DNS Customizable profiles Regular profile updates The RIGHT Person On the RIGHT Device In The RIGHT Way
  • 37. Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
  • 38. Global Threat Telemetry Global Threat Telemetry Cisco Security Intelligence Operation Cisco SensorBase Threat Operations Center Advanced Algorithms 8:10 GMT All Cisco Customers Protected Ad Agency HG in London Bank Branch in Chicago ISP Datacenter in Moscow 8:00 GMT Detects New Malware 8:03 GMT Sensor Detects Hacker Probing 8:07 GMT Sensor Detects New Botnet Higher Threat Coverage, Greater Accuracy, Proactive Protection
  • 39. Threat Intelligence: SIO Network Security Access Control Secure Mobility Content Security Cisco Security Solutions Portfolio ASA, ASA for Catalyst, VSG, ASA with IPS, IPS 4200, ISR IOS security, ASR, CSM Access Control Server, TrustSec, NAC ASA SSL VPN, ASA IPSEC VPN, Adaptive Wireless IPS, Cisco Virtual Office, AnyConnect IronPort Email Security Appliance, IronPort Web Security Appliance, ScanSafe Web Security Secure Cloud and Virtualization
  • 40. Existing Architecture Leverage Current Investments Leverage On-Premise Security CENTRALIZED SECURITY Malware Threat Protection Acceptable Use Policy Centralized Policy Enforcement AnyConnect Always-On VPN Traffic Backhauled MainOffice IronPortWeb Security Appliance Remote User BranchOffice DataCenter
  • 41. Cloud Security Malware Threat Protection Acceptable Use Policies DE-CENTRALIZED SECURITY Distributed Policy Enforcement VPN Data Center Access Security and VPN Clients Minimum Backhaul MainOffice MobileUser DataCenter InternetCafé MobileUser InternetCafé
  • 43. How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? Embrace Mobility. Address Security.Some Questions to Consider
  • 44. Cisco SecureX: The Ultimate Security SolutionAnnounced at RSA Keep Bad Stuff Out Protect Good Stuff Enable Productivity and Innovation Keep Critical Services Running Be Inbounds/ Compliant Requires an Architectural Approach
  • 45. Borderless Network ArchitectureEnabling Mobility—Securely, Seamlessly and Reliably Architecture for Agile Delivery of the Borderless Experience BORDERLESS END-POINT/USER SERVICES Securely, Reliably, Seamlessly:AnyConnect POLICY App Performance: App Velocity Energy Management: EnergyWise Multimedia Optimization: Medianet Mobility:Motion Security:TrustSec BORDERLESS NETWORK SERVICES MANAGEMENT BORDERLESS NETWORK SYSTEMS APIs Core Fabric Extended Cloud ExtendedEdge Unified Access Application Networking/ Optimization BORDERLESSINFRASTRUCTURE Switching Security Routing Wireless SMART PROFESSIONAL AND TECHNICAL SERVICES: Realize the Value of Borderless Networks Faster
  • 46. Cisco’s Borderless Networks Solutions Prepare Your Enterprise Network for Mobile Devices Implement a high capacity, high performance WLAN. Enable context-aware security for end-points and the network Meet User Demand for Mobility
  • 47. Key Resources White Paper: Optimize the Cisco Unified Wireless Network to Support Wi-Fi Enabled Phones and Tablets http://wifi-cs.co/ijRBqz White Paper: The Future of Network Security: Cisco SecureXArchitecture http://wifi-cs.co/jVazao