Beyond BYODMobility, Cloud and the Internet of Everything
COCCOC-2002
Donald Gunn, Program Manager Cisco IT
© 2015 Cisco and/or its affiliates. All rights reserved.COCCOC-2002 Cisco Public
Agenda
• Changing Environment
• Devices
• Security
• Support
• Cloud & Apps
• Questions
"BYOD strategies are the most radical change to the economicsand the culture of client computing in business in decades,"
Gartner, May 2013
Okta. 2014
Companies in the United States are twice as likely to allow BYOD as those in Europe
Gartner
Devices Apps Data Networks People
Identity &
Context
Devices,
Appliances &
Things
Apps & Cloud
Services
• Who
• Role\HR
• Where
• When
• How
• Policy
Device / Enterprise
Management
Trusted \
UntrustedeStore
Context
Compliance
Device ID
UserID
What applications
can you access? What devices
can you use?
Other14,365 38,399 15,635 17564
78,208 31,80510,073
69,960
Personally
Owned
Mobile
Devices
(BYOD)
122,759
Corporate
Provided
Devices
980
29.4%
Growth
2,673
BlackBerry
Android
Apple
0
10000
20000
30000
40000
50000
60000
70000
80000
Fixed Computing
(you go to the device)
1995
Mobility / BYOD
(the device goes with you)
2000
Internet of Things
(age of the device)
2013
Internet of Everything
(people,process,data,things)
2020
Source: Cisco IBSG, 2013
200M
10B
50B
De
vic
es
49,000 employees are using a
personally owned deviceCompany
Owned 65%
Personally
Owned 35%
End-user devices
70,000 personally owned devices
313,000personally owned devices
–
–
–
–
1. 2012 Cisco IBSG Horizons Study
Policy Technology
• Device to user attribution
• Encryption
• 6 character PIN / password
• Jailbreak / Rooted Device Detection
• 10 Minute Auto Lock
• Anti-malware
• Minimum OS Version
• Remote Wipe
• Hardware/Software Inventory
Device Categories
Local and Remote Wipe
Encryption andManagement
4 Digit PIN10 Minute Timeout
Trusted DevicesSecured Devices
Core
Network
Internet Only
Network
Public Cloud
Trusted
Devices
Untrusted Devices
Identity Services Engine
Wireless Devices
Mobile
Device
Management
AnyConnect VPN
Web Security Appliance
Wired Network Devices
Adaptive Security
Appliance
Cisco Core Network
Cisco Identity Services Engine (ISE)
•
•
•
•
WHERE WHENWHAT HOWWHO
Context-aware Identity and Authentication Services
• Identity of a device on the network
• Quantify the risk
1. Profiling
• User and end device attribution
• Identification of end points on Wireless connections
2. Authentication
• Device security posture identification
• Allows for better policy & security decisions
3. Posture
• Ability to enforce policy decisions based on context
• Untrusted devices have restricted access
4. Enforcement
ISE Capability Phasing
ISE 1.2 ISE 1.2 ISE 1.3
Corporate
Connectivity
Corporate
Apps & Services
Carrier
Connectivity
Device Hardware
Device OS
User, Carrier, Hardware Manufacturer
Self Support Evolution
Consumerized Communications
Collect intelligence from service providers, blogs, Twitter, and other sources
Build a multimedia comms plan, including video, digital signage, social content, and email
Participate in launch events and execute comms plan immediately following the announcement
Communicate any issues broadly and succinctly; set expectations frequently
Manage escalations consistently; people are very passionate and emotional
We’ll use Dropbox
(but not tell IT).
You saw this coming.
File Servers are
internal only.
And it’s all IT offers.
Dropbox works
anywhere.
It’s free. Really.
Facebook, Twitter, LinkedIn, YouTube,
Flickr, Foursquare, Instagram, Pinterest, MySpace, Google+, DeviantArt, LiveJournal,
Tagged, Orkut, Ning, Meetup, myLife, Multiply,
Tumblr, Reddit, StumbleUpon, Path, FlipBook, Reeder,
Dropbox, Box, Google Drive, iCloud, SkyDrive, CloudOn,
TED, CNN, iMessage, Game Center, QuickOffice,
Penultimate, Dragon, iTunes, Pandora, Spotify, Slacker, Rdio,
WatchESPN, Siri, Google Now, and…
“So I’ll just block it”
?Approx
2.5
Million
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Device Backups
+50,000 iOS 7 Devices
File Sharing
File Sharing
Why is This Happening!?!
Device Backups
+50,000 iOS 7 Devices
File Sharing
File Sharing
We had to allow usage to get
this data.
Blocking leaves you blind.
Device Backups
+50,000 iOS 7 Devices
File Sharing
File Sharing
Allow is the new Block
Secure Cloud
Sync
Backup Sync
Corporate stays
Corporate
Personal stays
Personal
Whole device remote
wipe becomes
a benefit!
Cisco IT App Selection
Basics
Mobile
eStore Apps
Collaboration
Tools
Connectivity Content and
Collateral
Learning
News &
Events
Sales BetaEmployee
Services
The Cisco eStore
Re
Entitlement Approvals TaxonomyChargebackReporting
Desktop Apps
Mobile Apps
Desktop HWWebEx Social Apps
Virtual HW
Mobile HW
Access to Storefront from
all OS & Device Types
Pervasive Security(versions, enforcement,
trusted devices)
Personalized, User Friendly
Catalog for all IT Services
Integrated with Enterprise
Service Management
Automated and Seamless
Service Provisioning
Cisco eStore
Cisco Prime
Service Catalog
Cisco Process
Orchestrator
Native• Data stored on device
• Highest performance
• Native device experience
HTML5 / Browser• Data may be stored on device
or vendor cloud store
• Portable to many devices
• Browser experience
Virtual• No local data on device
• Highest security
• Translated experience
Native Application
HTML5 / Browser
Virtualization
“Sorry to bother you tonight, but is there any chance you can
approve two purchases right now? This is urgent. Thanks.” – Text
Message at 20:24 on Friday
AnyConnect
automatically creates
a secure tunnel
using certificates
I log in to
MyApprovals with
SSO and approve
the two purchases.
82% more devices 28% more users 203% more data usage
33% fewer cases 28% higher satisfaction 25% lower per user cost
*2 year comparison
–
–
–
© 2015 Cisco and/or its affiliates. All rights reserved.COCCOC-2002 Cisco Public
Complete Your Online Session Evaluation
• Please complete your online sessionevaluations after each session.Complete 4 session evaluations& the Overall Conference Evaluation(available from Thursday)to receive your Cisco Live T-shirt.
• All surveys can be completed viathe Cisco Live Mobile App or theCommunication Stations