seizing the byod opportunity
DESCRIPTION
Emilio Umeoka's presentation from the 2012 Canalys event.TRANSCRIPT
1 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
SEIZING THE BYOD OPPORTUNITYEmilio Umeoka
SVP, Worldwide Partners and Alliances
2 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
IN THE LAST 5 YEARS WE HAVE SEEN
Massive Connectivity
Consumerization of IT
Rise of Apps Move to Cloud
Increasing Threats
3 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
PROLIFERATION OF MOBILE DEVICES SHIFTING TRADITIONAL ENTERPRISE IT
90%
Already deployed mobile devices
86%
Will deploy tablets this year
Source: Gartner Research, June 2012
4 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
TOP PRIORITIES OF CIO’S
72%
Expand use of mobile/tablet apps for employees, customers, business partners
Significantly upgrade our security environment
67%Increase use of business intelligence and decision-support tools and services
67%Consolidate IT infrastructure via data center/server consolidation or virtualization
67%Significantly upgrade disaster recovery and business continuity capabilities
62%Implement or expand use of collaboration capabilities
71%
Source: Forrester/Juniper, October 2012
5 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?
What are good BYOD support tools, analysis, associated costs? What are the pitfalls of BYOD? How to deploy a BYOD policy? What is a good laptop purchase program? What are some remote office strategies (for executives vs.
sales)? Who pays for device & data? Employee, company, both?
“
”
100%
BYOD SPECTRUM
0%
6 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?
How to meet demand without compromising security policy? What is data and licensing liability, with employee departures? Will BYOD make it easier to on-board & off-board resources? What are different MDM strategies: BYOD, BYOD & company
provided, or just company provided?
“
”
100%
BYOD SPECTRUM
0%
7 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
How to optimize networks with app delivery via smart phones? Are ERPs ready for smart phones? How to support legacy apps not designed for mobility & BYOD?“
”
WHERE DO YOUR CUSTOMERS FIT IN THE BYOD SPECTRUM?
100%0%
BYOD SPECTRUM
8 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
OPPORTUNITY AHEAD:
Implications For Partners
9 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
Protecting Corporate IP Managing Personal Information Maintaining Continuity Data Backup & Recovery
1
SECURITY IS THE PRIMARY CONCERN
10 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
CHALLENGE: SECURING A COMPLEX ECOSYSTEM
Service Provider Core Networks
Enterprise Campus & Branch
Data Center
Edge Networks
WHAT’S REQUIRED:SECURITY INTELLIGENCE AT EVERY LEVEL
PervasiveSecurity
Intelligence
Objective:
Proliferation of Applications
Proliferation of End-User Devices
Service Provider Core Networks
Enterprise Campus & Branch
Data Center
Edge Networks
Proliferation of Applications
Proliferation of End-User Devices
11 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
LEADERSHIP IN SECURITY
Security Is Core To Our Business At Juniper
$1B Global Security Revenue
#1 Remote Access SSL VPN
#1 High-End Firewalls
#3 Network Security
Serving customers in over 47 countries, with a worldwide community of over 1000 Reseller
PartnersInfonetics Research 2012
12 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
Need For A New Class Of Enterprise Apps That Can Be Rapidly Deployed
2
A WORLD OF MOBILE DEVICE MANAGEMENT & ENTERPRISE APPS
13 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
USER EXPERIENCE VS PROTECTION & CONTROL
User Experience
Protection & Control
14 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
JUNIPER’S MOBILE SOLUTION FROM DEVICE TO DATA CENTER
ProtectConnect
Manage
Corporate / Cloud VPN
Authentication Differentiated Access
Mobile Loss and Theft Mobile Threat
Prevention
Anytime, Anywhere Secure Access
Anytime, AnywhereThreat Protection
15 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
At The Point Where Users Connect
BYOD Will Drive an
3
ARCHITECTURAL TRANSITION IN THE DATA CENTER
16 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
COMPREHENSIVE SOLUTION FOR TRUSTED MOBILITY AT SCALE
Juniper offers an integrated portfolio of wired, wireless & security for mobility at scale
Scalable mobility Single client for all devices Fewer wires and fewer devices
to manage Comprehensive Security
17 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
Leverage BYOD To Create Business ADVANTAGE and Distinction
DRIVE REVENUE AND ACCELERATE YOUR BUSINESS
18 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
EVERY ASPECT OF BYOD REPRESENTS OPPORTUNITY
System Sales Software
SalesIntegration
Services ConsultingDesign and
Implementation
19 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
TAKEAWAYS…
1. Differentiate with Juniper’s security solutions from device to data center
2. Grow your share of wallet with broader campus/branch and data center solutions and services practices
3. Leverage resources and rewards available to you through Juniper Partner Advantage
20 Copyright © 2012 Juniper Networks, Inc. www.juniper.net
LET’S TALK...
Here at Canalys Visit us on Level 2 –
“Millenia 4” room Schedule an appointment
with us via your delegate zone on ccfmob.com
After Canalys Jonathan Belcher, VP
Partners - APAC [email protected]
Go to www.Juniper.net/partners