SlideShare a Scribd company logo
1 of 30
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3
IMMERSIVE 
COLLABORATION 
Pervasive Video 
THE NETWORK 
MOBILITY 
BYOD 
CLOUD 
SaaS | DC / V 
SECURITY, Accelerating Cyber-Threats 
IT PRODUCTIVITY, Service and Network Management 
GREEN, Energy Efficiency 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Public 4
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8
Trusted 
WiFi 
 Authenticate User 
 Fingerprint Device 
 Apply Corporate Config 
 Enterprise Apps 
 Automatic Policies 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9
Trusted 
WiFi 
Apply defined policy 
profiles based on: 
 Device Type 
 User 
 Location 
 Application 
802.11n Wi-Fi 
Identity-Based 
Access Control 
Mobile Device 
Management 
WAN Optimization 
Service Assurance 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Trusted 
WiFi 
Access: FULL 
Electronic Medical Records 
Mobile TelePresence 
Email 
Instant Messenger 
No Yes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11
Is Mr. Allen’s lab work ready yet? 
Not yet but i will let you know the 
moment it arrives 
Trusted 
WiFi 
802.11n Wi-Fi 
 Location 
 Video Optimization 
 Spectrum 
Intelligence 
 Client Acceleration 
Identity-Based 
Access Control 
Mobile Device 
Management 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Untrusted WiFi 
Access: Limited 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13
Hotspot 2.0 
802.11n 
Wi-Fi 
Web/Email 
Security 
Identity- 
Based 
Access 
Control 
VPN 
Collaboration/ 
UC 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15
3G/4G 
Access: Limited 
Electronic Medical Records 
Mobile TelePresence 
Email 
Instant Messenger 
No Yes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Identity-Based 
Access Control 
VPN 
3G/4G 
Intelligent 
Packet Core 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17
Trusted 
WiFi 
Access: FULL 
Electronic Medical Records 
Mobile TelePresence 
Email 
Instant Messenger 
No Yes 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18
802.11n Wi-Fi 
Full Service 
Home Router 
Collaboration/UC 
Trusted 
WiFi 
Bandwidth Priority 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20
NEW USER BEHAVIORS NEW NETWORK DEMANDS 
Secure connectivity and 
policy enforcement on any 
mobile device 
Accessing business 
applications from employee 
devices 
Policy enforcement and data 
loss prevention on friendly 
rogues 
40 percent of staff use 
unmanaged devices 
Pervasive coverage and 
simplified management 
Using an average of 2–3 
mobile devices 
Increased network reliability 
and throughput 
Video calls and access to 
collaboration applications 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
USERS DEMAND: I WANT TO… IT CHALLENGE: HOW DO I? 
Onboard My Users 
and Their Devices 
Use the Device I Want 
Enable Secure, 
Reliable Experience 
Seamless Experience 
Across Devices 
Simplify Ongoing 
Operations 
Greater Flexibility 
and Productivity 
1 
2 
3 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
How do I simply 
and safely on-board 
new devices? 
I just bought a new iPad. 
I want to use it on my 
enterprise network. 
1 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Priorities: 
User choice and experience 
Okay to mix corporate and personal data 
Application performance on mobile devices 
Priorities 
Meet strict privacy and or audit regulations 
Existing policy for VDI and immediate need 
Maximize consistency and security 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
BEFORE 
Separated Policy Management 
AFTER 
Context-Based Policy for Employees 
and Guests Across Network 
Who? What? When? Where? How? 
Unified Policy 
Wired | VPN | Wireless Simple | Unified | Automated 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
How can I provide 
a seamless experience 
with high performance? 
I want a good 
experience on 
my new iPad. 
2 
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29
BEFORE 
Disparate Wired and Wireless Networks 
AFTER 
Better Together: 
Cisco Switching and Wireless 
Virtualized 
Data Center 
Distributed 
Workforce 
Core: Policy, 
Management 
Distribution: 
High Availability 
Access: Security, 
Video, POE, CleanAir 
TCO Simplified installation and operations 
Scalability Centralized policy, distributed 
enforcement 
Visibility Network insight with single pane 
of glass management 
Wired Wireless 
Scalability & Performance Bottlenecks, instability 
Inconsistency Different wire & wireless policies 
Higher Costs Duplicated management and 
support for wired and wireless 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30

More Related Content

What's hot

Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAlcatel-Lucent Enterprise
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTAlcatel-Lucent Enterprise
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyCisco Webex
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance NetworkCollaborators
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...NetworkCollaborators
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalSarah Reinbolt, MBA
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsCisco Webex
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networkingNetworkCollaborators
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...NetworkCollaborators
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsTiago Monteiro
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTAlcatel-Lucent Enterprise
 
Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeUS-Ignite
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityCisco Webex
 
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for youCisco Canada
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
Go Mobile with Cisco Webex
Go Mobile with Cisco WebexGo Mobile with Cisco Webex
Go Mobile with Cisco WebexCisco Webex
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1Nil Menon
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Canada
 

What's hot (20)

Addressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified AccessAddressing Needs of BYOD for Enterprises with Unified Access
Addressing Needs of BYOD for Enterprises with Unified Access
 
Discovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoTDiscovering the Network Foundation for Mobility and IoT
Discovering the Network Foundation for Mobility and IoT
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
IoT System SalesBytes Overview Final
IoT System SalesBytes Overview FinalIoT System SalesBytes Overview Final
IoT System SalesBytes Overview Final
 
Safely Return to Work with Webex Rooms
Safely Return to Work with Webex RoomsSafely Return to Work with Webex Rooms
Safely Return to Work with Webex Rooms
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...Cisco Connect 2018 Singapore -  Data center transformation a customer perspec...
Cisco Connect 2018 Singapore - Data center transformation a customer perspec...
 
Itn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskillsItn instructor ppt_chapter1 exploring the network smartskills
Itn instructor ppt_chapter1 exploring the network smartskills
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
 
Extreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation ChallengeExtreme Networks SDN Innovation Challenge
Extreme Networks SDN Innovation Challenge
 
Straight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and ConfidentialityStraight Talk on End to End Encryption and Confidentiality
Straight Talk on End to End Encryption and Confidentiality
 
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
Go Mobile with Cisco Webex
Go Mobile with Cisco WebexGo Mobile with Cisco Webex
Go Mobile with Cisco Webex
 
CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1CCNA 1 Routing and Switching v5.0 Chapter 1
CCNA 1 Routing and Switching v5.0 Chapter 1
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev net
 

Viewers also liked

Viewers also liked (9)

Colter's Creek Winery Campaign
Colter's Creek Winery CampaignColter's Creek Winery Campaign
Colter's Creek Winery Campaign
 
Revista tecnologica de los temas 1
Revista tecnologica de los temas 1Revista tecnologica de los temas 1
Revista tecnologica de los temas 1
 
Regimen de transporte terrestre
Regimen de transporte terrestreRegimen de transporte terrestre
Regimen de transporte terrestre
 
Eva carolina aguirre v2
Eva carolina aguirre v2Eva carolina aguirre v2
Eva carolina aguirre v2
 
Asesoría para el uso de las tic actividad 2
Asesoría para el uso de las tic    actividad 2Asesoría para el uso de las tic    actividad 2
Asesoría para el uso de las tic actividad 2
 
THE_NURSING_JOB final
THE_NURSING_JOB finalTHE_NURSING_JOB final
THE_NURSING_JOB final
 
Pilares De Una Pareja
Pilares De Una ParejaPilares De Una Pareja
Pilares De Una Pareja
 
B Comm
B CommB Comm
B Comm
 
NWCID - Company Slideshow
NWCID - Company SlideshowNWCID - Company Slideshow
NWCID - Company Slideshow
 

Similar to BYOD without Compromise

ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünlericem lale
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...Nur Shiqim Chok
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Mustapha Kohili
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Networkteknetir
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the NetworkYaser Rahmati
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Danny Liu
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...Nur Shiqim Chok
 

Similar to BYOD without Compromise (20)

ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
Cisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance ÜrünleriCisco-Security & Survelliance Ürünleri
Cisco-Security & Survelliance Ürünleri
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
[Cisco Connect 2018 - Vietnam] Yedu hn-introducing cisco dna assurance-yedu f...
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02Itninstructorpptchapter1final 141024004546-conversion-gate02
Itninstructorpptchapter1final 141024004546-conversion-gate02
 
Chapter 1 : Exploring the Network
Chapter 1 : Exploring the NetworkChapter 1 : Exploring the Network
Chapter 1 : Exploring the Network
 
Chapter 01 - Exploring the Network
Chapter 01 -  Exploring the NetworkChapter 01 -  Exploring the Network
Chapter 01 - Exploring the Network
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

BYOD without Compromise

  • 1. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1
  • 2. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2
  • 3. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3
  • 4. IMMERSIVE COLLABORATION Pervasive Video THE NETWORK MOBILITY BYOD CLOUD SaaS | DC / V SECURITY, Accelerating Cyber-Threats IT PRODUCTIVITY, Service and Network Management GREEN, Energy Efficiency © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Public 4
  • 5. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5
  • 6. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6
  • 7. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7
  • 8. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8
  • 9. Trusted WiFi  Authenticate User  Fingerprint Device  Apply Corporate Config  Enterprise Apps  Automatic Policies Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9
  • 10. Trusted WiFi Apply defined policy profiles based on:  Device Type  User  Location  Application 802.11n Wi-Fi Identity-Based Access Control Mobile Device Management WAN Optimization Service Assurance Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10
  • 11. Trusted WiFi Access: FULL Electronic Medical Records Mobile TelePresence Email Instant Messenger No Yes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11
  • 12. Is Mr. Allen’s lab work ready yet? Not yet but i will let you know the moment it arrives Trusted WiFi 802.11n Wi-Fi  Location  Video Optimization  Spectrum Intelligence  Client Acceleration Identity-Based Access Control Mobile Device Management Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12
  • 13. Untrusted WiFi Access: Limited Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13
  • 14. Hotspot 2.0 802.11n Wi-Fi Web/Email Security Identity- Based Access Control VPN Collaboration/ UC Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14
  • 15. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15
  • 16. 3G/4G Access: Limited Electronic Medical Records Mobile TelePresence Email Instant Messenger No Yes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16
  • 17. Identity-Based Access Control VPN 3G/4G Intelligent Packet Core Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17
  • 18. Trusted WiFi Access: FULL Electronic Medical Records Mobile TelePresence Email Instant Messenger No Yes Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18
  • 19. 802.11n Wi-Fi Full Service Home Router Collaboration/UC Trusted WiFi Bandwidth Priority Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19
  • 20. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20
  • 21. NEW USER BEHAVIORS NEW NETWORK DEMANDS Secure connectivity and policy enforcement on any mobile device Accessing business applications from employee devices Policy enforcement and data loss prevention on friendly rogues 40 percent of staff use unmanaged devices Pervasive coverage and simplified management Using an average of 2–3 mobile devices Increased network reliability and throughput Video calls and access to collaboration applications © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. USERS DEMAND: I WANT TO… IT CHALLENGE: HOW DO I? Onboard My Users and Their Devices Use the Device I Want Enable Secure, Reliable Experience Seamless Experience Across Devices Simplify Ongoing Operations Greater Flexibility and Productivity 1 2 3 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
  • 23. How do I simply and safely on-board new devices? I just bought a new iPad. I want to use it on my enterprise network. 1 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
  • 24. Priorities: User choice and experience Okay to mix corporate and personal data Application performance on mobile devices Priorities Meet strict privacy and or audit regulations Existing policy for VDI and immediate need Maximize consistency and security © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. BEFORE Separated Policy Management AFTER Context-Based Policy for Employees and Guests Across Network Who? What? When? Where? How? Unified Policy Wired | VPN | Wireless Simple | Unified | Automated © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
  • 27. How can I provide a seamless experience with high performance? I want a good experience on my new iPad. 2 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
  • 28. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
  • 29. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 29 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29
  • 30. BEFORE Disparate Wired and Wireless Networks AFTER Better Together: Cisco Switching and Wireless Virtualized Data Center Distributed Workforce Core: Policy, Management Distribution: High Availability Access: Security, Video, POE, CleanAir TCO Simplified installation and operations Scalability Centralized policy, distributed enforcement Visibility Network insight with single pane of glass management Wired Wireless Scalability & Performance Bottlenecks, instability Inconsistency Different wire & wireless policies Higher Costs Duplicated management and support for wired and wireless © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30