scot hull with cisco - beyond byod -- stalwart executive briefing 2012

38
© 2012 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Beyond BYOD The Optimal Experience for Any Workspace Scot Hull Security Specialist Spring 2012

Upload: stalwartacademy

Post on 15-May-2015

1.839 views

Category:

Technology


0 download

DESCRIPTION

See this slide deck from a wonderful "Beyond BYOD" presentation by Cisco's Scot Hull, which took place at Stalwart's 3rd Annual Executive Briefing and CIO Roundtable at the Grove Park Inn.

TRANSCRIPT

  • 1.Beyond BYOD The Optimal Experience for Any WorkspaceScot HullSecurity SpecialistSpring 2012 2012 Cisco and/or its affiliates. All rights reserved. 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

2. 2011employee-owned devices used to41% access business applications Forresterof college students/young employees 40%prefer a lower-paying job that hasmore flexibility CCWTROf US information workers spend time 56%working outside the office Forresterof IT staff is struggling to keep 100% up with mobility trendsGartner 2012 Cisco and/or its affiliates. All rights reserved. 2 3. 2012 Cisco and/or its affiliates. All rights reserved. 3 4. 2012 Cisco and/or its affiliates. All rights reserved. 4 5. 2012 Cisco and/or its affiliates. All rights reserved. 5 6. Does your organization have a BYOD Security Policy? Do your employees use their personal smart phones or tablets for work? Are you protected against vulnerabilities introduced by personal devices and social media sites? Do you have a consistent access control policy for guests, contractors, wired users, wireless users, etc? Do you track users or authenticate them before allowing them on your network? Do you know what devices are on your network? 2012 Cisco and/or its affiliates. All rights reserved.6 7. The Platform Chaos is Shaking OutAndroid King of Smartphones, While Apple Reigns in Tablets 89% 75% 26% 10% 36% 22% 1% 23% 2012 Cisco and/or its affiliates. All rights reserved. 7 8. 462 million CHALLENGE 350M of these devices connecting to Facebook! 2012 Cisco and/or its affiliates. All rights reserved. 8 9. 2012 Cisco and/or its affiliates. All rights reserved. 9 10. 2012 Cisco and/or its affiliates. All rights reserved. 10 11. BYOD Security RisksEmployee-owned Mobile DevicesAre Riskiest THREATS Difficult to control and secure (1/3 ofall workers are out of the office) Malware (Web: #1 attack vector) Vulnerability to the organization Data loss from lost or stolen devices Access control breach Policy compliance challengesSource: 2011 ISACA IT Risk/Reward Barometer, US Edition (www.isaca.org/risk-reward-barometer) 2012 Cisco and/or its affiliates. All rights reserved.11 12. Customer Goals WorthyPriorities d Use Cases1. Protect endpointsfrom Web 2.0threats 2. Provide secureremote access fromdevices 3. Authenticate &Authorize wirelessusers who areconnecting tonetwork (Guests,Contractors, etc.) 54% block social media as a matter of policy. Great!What about those smart phones synching with your laptops? 2012 Cisco and/or its affiliates. All rights reserved.12 13. Home, Hospital, 3GiPhone, Kindle, home laptop Desktop, iPad Hospital, home Hospital,HotSpot, 3G High user density Limited scalability formore users/devices Different access needsby device, user,application, location Inconsistent experienceAndroid phone, tablet Security challenges Hospital, home High complexity Hospital, branch clinics,Hospital home, 3G iPad, iPhone,Lenovo, BlackBerryhome laptop 2012 Cisco and/or its affiliates. All rights reserved.Cisco Confidential 13 14. SecuringManagingDelivering Any Complexity High-QualityAccess And Scale Experience 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 15. Uncompromised Experience for Any WorkspaceDevice OnboardingUnified Uncompromised Simplifiedand Guest Access PolicyExperienceOperationsBYOD Beyond BYOD 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 16. 2012 Cisco and/or its affiliates. All rights reserved. 16 17. TrustedWiFi Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 18. Unified Policy -Zero touch provisioning Trusted - MDM integrationWiFiApply defined policyprofiles based on:Uncompromised Device TypeExperience User Location MDM posture Simplified Operations 2012 Cisco and/or its affiliates. All rights reserved.Cisco Confidential 18 19. TrustedWiFi Access: FULLElectronic Medical RecordsMobile TelePresenceEmailInstant Messenger 2012 Cisco and/or its affiliates. All rights reserved.Cisco Confidential 19 20. Trusted WiFi 2012 Cisco and/or its affiliates. All rights reserved. 20 21. Unified Policy-Identity based accessAccess: Limitedcontrol Filtered EMR -Endpoint scanning Internet Patient visit tracking Trusted WiFiUncompromisedExperience-Client acceleration- 802.11u, 802.11r-Jabber on iPadSimplified Operations 2012 Cisco and/or its affiliates. All rights reserved.21 22. 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 23. TrustedWiFiAccess: FULL Apply defined policy profiles based on:Video FacilitiesClass ContentCollaboration AppsStudent Records 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 24. Access: Limited Access: Limited Internet Class Content InternetCollaboration Apps Class Content Collaboration Apps Access: LimitedInternet Access: LimitedClass ContentInternet Collaboration Apps Class ContentCollaboration Apps 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 25. Play Video Play Video Play VideoPlay Video 2012 Cisco and/or its affiliates. All rights reserved.Cisco Confidential 25 26. One Network-Client Acceleration-Video scale-POE pass-throughOne Policy-Identity based access control One Management 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 27. 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 28. WiFi Hotspot Access: Limited Internet Account History Specials 2012 Cisco and/or its affiliates. All rights reserved. 28 29. SIZEM FIND COLLECTION STYLE COLOR ACCESSORIES 2012 Cisco and/or its affiliates. All rights reserved. 29 30. Unified Policy- Identity-based accesscontrol Payment CompleteUncompromisedExperience-802.11r, 802.11u-Client accelerationWiFi Hotspot-LocationAccess: FullCustomer ERPEmployee NewsInventorySpecials Simplified Internet access Operations 2012 Cisco and/or its affiliates. All rights reserved. 30 31. 2012 Cisco and/or its affiliates. All rights reserved. 31 32. Unified Policy Add to Client File?-Identity-based accesscontrol- ScanSafe YESNOIMG_2301IMG_2302IMG_2303 IMG_2304 Uncompromised Experience-802.11rWiFi Hotspot-Outdoor Wi-Fi-Interference protection Access: Limited My Policy Internet accessSimplified Operations 2012 Cisco and/or its affiliates. All rights reserved. 32 33. 2012 Cisco and/or its affiliates. All rights reserved. 33 34. Trusted WIFI Unified PolicyHD VoIPWebEx- Identity based access VideoAccess: Network AdmincontrolPrime Management CollaborationEmailInternet Uncompromised Experience Simplified Operaitons-Realtime experiencetracking- Policy integration- Wired/wirelessmonitoring and/or its affiliates. All rights reserved. 2012 Cisco34 35. NEW Identity Services Engine (ISE) FeaturesSINGLE SOURCEFor wired, wireless, VPN and cellular access. OF POLICY Policy based on user, device, application, compliance, trust levelEASY SELF- One-step self-registration to speed adoption of new devices, PROVISIONINGand minimize administrative overhead (ISE 1.1 MR) MDM POLICYInformation exchange between MDM applications and ISE forINTEGRATIONdeep visibility into devices to create and enforce policies 2012 Cisco and/or its affiliates. All rights reserved.35 36. Seamless wired/wireless/VPNUncompromisedHighest performance and scaleExperience Future-ready standardsUnifiedSingle source for wired, wireless,VPN, MDMPolicy Context-aware accessSimplified User experience monitoringOperations Wired, wireless management 2012 Cisco and/or its affiliates. All rights reserved. 36 37. 2012 Cisco and/or its affiliates. All rights reserved. 37 38. Thank You 2012 Cisco and/or its affiliates. All rights reserved. 38