seizing the byod opportunity

Post on 19-Jan-2015

735 Views

Category:

Technology

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

Emilio Umeoka's presentation from the 2012 Canalys event.

TRANSCRIPT

1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

SEIZING THE BYOD OPPORTUNITYEmilio Umeoka

SVP, Worldwide Partners and Alliances

2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

IN THE LAST 5 YEARS WE HAVE SEEN

Massive Connectivity

Consumerization of IT

Rise of Apps Move to Cloud

Increasing Threats

3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

PROLIFERATION OF MOBILE DEVICES SHIFTING TRADITIONAL ENTERPRISE IT

90%

Already deployed mobile devices

86%

Will deploy tablets this year

Source: Gartner Research, June 2012

4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

TOP PRIORITIES OF CIO’S

72%

Expand use of mobile/tablet apps for employees, customers, business partners

Significantly upgrade our security environment

67%Increase use of business intelligence and decision-support tools and services

67%Consolidate IT infrastructure via data center/server consolidation or virtualization

67%Significantly upgrade disaster recovery and business continuity capabilities

62%Implement or expand use of collaboration capabilities

71%

Source: Forrester/Juniper, October 2012

5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?

What are good BYOD support tools, analysis, associated costs? What are the pitfalls of BYOD? How to deploy a BYOD policy? What is a good laptop purchase program? What are some remote office strategies (for executives vs.

sales)? Who pays for device & data? Employee, company, both?

100%

BYOD SPECTRUM

0%

6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?

How to meet demand without compromising security policy? What is data and licensing liability, with employee departures? Will BYOD make it easier to on-board & off-board resources? What are different MDM strategies: BYOD, BYOD & company

provided, or just company provided?

100%

BYOD SPECTRUM

0%

7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

How to optimize networks with app delivery via smart phones? Are ERPs ready for smart phones? How to support legacy apps not designed for mobility & BYOD?“

WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?

100%0%

BYOD SPECTRUM

8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

OPPORTUNITY AHEAD:

Implications For Partners

9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Protecting Corporate IP Managing Personal Information Maintaining Continuity Data Backup & Recovery

1

SECURITY IS THE PRIMARY CONCERN

10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

CHALLENGE: SECURING A COMPLEX ECOSYSTEM

Service Provider Core Networks

Enterprise Campus & Branch

Data Center

Edge Networks

WHAT’S REQUIRED:SECURITY INTELLIGENCE AT EVERY LEVEL

PervasiveSecurity

Intelligence

Objective:

Proliferation of Applications

Proliferation of End-User Devices

Service Provider Core Networks

Enterprise Campus & Branch

Data Center

Edge Networks

Proliferation of Applications

Proliferation of End-User Devices

11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

LEADERSHIP IN SECURITY

Security Is Core To Our Business At Juniper

$1B Global Security Revenue

#1 Remote Access SSL VPN

#1 High-End Firewalls

#3 Network Security

Serving customers in over 47 countries, with a worldwide community of over 1000 Reseller

PartnersInfonetics Research 2012

12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Need For A New Class Of Enterprise Apps That Can Be Rapidly Deployed

2

A WORLD OF MOBILE DEVICE MANAGEMENT & ENTERPRISE APPS

13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

USER EXPERIENCE VS PROTECTION & CONTROL

User Experience

Protection & Control

14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

JUNIPER’S MOBILE SOLUTION FROM DEVICE TO DATA CENTER

ProtectConnect

Manage

Corporate / Cloud VPN

Authentication Differentiated Access

Mobile Loss and Theft Mobile Threat

Prevention

Anytime, Anywhere Secure Access

Anytime, AnywhereThreat Protection

15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

At The Point Where Users Connect

BYOD Will Drive an

3

ARCHITECTURAL TRANSITION IN THE DATA CENTER

16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

COMPREHENSIVE SOLUTION FOR TRUSTED MOBILITY AT SCALE

Juniper offers an integrated portfolio of wired, wireless & security for mobility at scale

Scalable mobility Single client for all devices Fewer wires and fewer devices

to manage Comprehensive Security

17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

Leverage BYOD To Create Business ADVANTAGE and Distinction

DRIVE REVENUE AND ACCELERATE YOUR BUSINESS

18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

EVERY ASPECT OF BYOD REPRESENTS OPPORTUNITY

System Sales Software

SalesIntegration

Services ConsultingDesign and

Implementation

19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

TAKEAWAYS…

1. Differentiate with Juniper’s security solutions from device to data center

2. Grow your share of wallet with broader campus/branch and data center solutions and services practices

3. Leverage resources and rewards available to you through Juniper Partner Advantage

20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net

LET’S TALK...

Here at Canalys Visit us on Level 2 –

“Millenia 4” room Schedule an appointment

with us via your delegate zone on ccfmob.com

After Canalys Jonathan Belcher, VP

Partners - APAC jbelcher@juniper.net

Go to www.Juniper.net/partners

top related