© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Unified Access RoadshowDay 3: Keynote Presentation George StromeyerVP, Worldwide Security Sales
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Agenda for the DayIndustry Trends and ChallengesWhy Unified Access Is Important to You
Unified Access Architecture: A Reference Design for SuccessDefine Unified AccessDefine Cisco Differentiators
Enabling Unified Access as a System
Key Takeaways
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Enterprise Megatrends
MOBILITYBYOD
CLOUDSaaS | DC / V
THE NETWORK
IMMERSIVECOLLABORATIONPervasive Video
COST CONTROL, TCO, Operational Efficiency
IT EFFECTIVENESS, Service and Network
Management
SECURITY, Accelerating Cyber-Threats
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Cisco’s Architectural Approach
MOBILITYBYOD CLOUD
SaaS | DC/V
IMMERSIVECOLLABORATIONPervasive Video
Collaboration
Data Center/Virtualization
BorderlessNetworks
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
MA
NA
GE
ME
NT
PR
IME
Borderless Networks Framework
Technology, Innovation
Wireless Routing SwitchingApplicationNetworking/Optimization
SecurityAppliance
and Firewall
Network and Endpoint Services
EnergyWiseEnergy
Management
TrustSecPolicy
Enforcement
App Visibilityand Control
App Performance
MedianetMultimedia
Optimization
Cloud ConnectorCloud
Optimization
BYOD Desktop Virtualization
Pervasive Video
Remote Expert
Cloud Computing
IT/OT Convergence
Key ITInitiatives
Systems Excellence
Unified Access
Cloud IntelligentNetworks
Connected Industries
SecureX
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
MA
NA
GE
ME
NT
PR
IME
Borderless Networks Framework
Technology, Innovation
Wireless Routing SwitchingApplicationNetworking/Optimization
SecurityAppliance
and Firewall
Network and Endpoint Services
EnergyWiseEnergy
Management
TrustSecPolicy
Enforcement
App Visibilityand Control
App Performance
MedianetMultimedia
Optimization
Cloud ConnectorCloud
Optimization
BYOD Desktop Virtualization
Pervasive Video
Remote Expert
Cloud Computing
IT/OT Convergence
Key ITInitiatives
Systems Excellence
Unified Access
Cloud IntelligentNetworks
Connected Industries
SecureX
BYOD
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Consumerization of ITThree trends companies are dealing with
Personal
Business
Social Media Device ExplosionBlurred Boundaries
Source: IDC
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Demand for Mobility
15 billionnew networked mobile
devices by 2015
3/4of employees uses
MULTIPLE DEVICES for work
56%of information workers
spend time workingOUTSIDE THE OFFICE
100%of IT staff
STRUGGLEto keep up withmobile needs
Mobility is driving a transformational change
in IT
Device consumerization is driving a
transformational change in user experience
Will transform how every business delivers IT to
its employees
Will change how every business interacts with
its customers
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 9
“By 2014, 90% of organizations will allow personal devices for work use.”—Gartner
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 10
It's war! BYOD exposes IT's deep distrust of users
September 25, 2012
G a l e n G r u m a n
Users: Yes, IT really does think you're stupid and/or naive, and therefore not to be trusted. IT: Yes, users really do think you're clueless about their needs and so have decided to act on their own.
That in a nutshell is what Unisys's new survey (conducted by Forrester Research) of IT and users around the topic of consumerization of IT has shown. The survey released today is significant because it's the third annual such survey Unisys has conducted, not only shows the current state, but lets us see what, if anything has changed, over the last several years after the bring-your-own notion's dramatic rise in 2010.
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 11
2012 Consumerization of IT Study
“The Mobile Elite bring new innovative ideas from the consumer world, define new rules of customer engagement, and identify creative means to solve business problems.”
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Cisco ITAny Device Landscape Today
Traditional Corporate Laptops
16,7007,327 3,6062,05194,205
Corporate VXI Endpoints
Mobile BYO Devices
9,500 21,905 5,973 10,766 Other1,531
Cisco’s mobile device growth rate (CAGR) is 42%
Mobile Device Adoption is growing dramatically
IT Support Models are changing from full
support to self-support or IT-assisted support
Mix of full support devices, self-support
devices
High growth on the WLAN causing
challenges
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 14
“100% of IT is struggling to keep up with mobility trends.”—Gartner
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
BYOD Customer SpectrumFlexible Business Requirements
Considerations:
Different industries have different compliance
requirements
User populations have different support level
needs
Job roles have differing demands for mobility
Corporate data have different classifications
and confidentiality
EnvironmentRequires Tight Controls
Corp Only DeviceManufacturing Environment
Trading FloorClassified Government
NetworksTraditional Enterprise
Focus on Basic Services,
Easy Access
Broader Device Types but Internet Only
Educational EnvironmentsPublic Institutions
Simple Guest
Enable Differentiated Services, On-Boarding
with Security—Onsite/Offsite
Multiple Device Types + Access Methods
Early BYOD Enterprise Adopters
Corp Native Applications, New Services,Full Control
Any Device, Any Ownership
Innovative EnterprisesRetail on Demand
Mobile Sales Services (Video, Collaboration, etc.)
LIMITED ACCESS ADVANCEDENHANCEDBASIC
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
New User Expectations Place New Demands on the Network
NEW USER BEHAVIORS NEW NETWORK DEMANDS
Secure Connectivity and Policy Enforcement on Any Wired or Wireless Location
Wired/Wireless Challenges
Accessing Business Applications from Employee Devices
Policy Enforcement and Secured Communication
Expectation of Access to Resources from Anywhere
Pervasive Coverage and Simplified Management
Using An Average of Two to Three Mobile Devices
Greater Visibility and Increased Network Reliability and Throughput
Preserving The User Experience on Any Device, from Anywhere
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Application Models Affect StrategyKey Tradeoffs:
PortabilitySecurityUsability
Desktop/App Virtualization
Client
Native Application
Native Application
Native Application
Data Center
Data Center
Desktop/App Virtualization
Software
Native Local data on device Maximum performance Native device experience Available offline (?)
Virtual No local data on device Maximum security Translated experience Must be online
Native Application
Data Center
Browser Some local data on device Portable to many devices Browser experience Must be online
WebBrowser
HTML Interface
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
BYOD
Unified Access
Cisco’s BYOD Smart SolutionDriving Innovation Through Collaboration
Core Infrastructure Wired and WirelessCisco Prime Infrastructure
Collaboration Applications WebEx, Jabber
Policy Management Infrastructure ISE
Secure Mobility ScanSafe, WSA, ASA AnyConnect
Workspace Management MDM
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 20
Unified Access
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Unified Access ArchitectureOne Policy, One Management, One Network
Cisco Prime Infrastructure
CiscoCatalystSwitches
Wired Network
AnyConnect VPN
Cisco WLAN Controller
Wireless Network
Identity Services Engine and TrustSec
Access strategy needs to consider wired,
wireless and remote/mobile 3G/4G
Single integrated architecture with device
visibility and policy enforcement
Ability to translate flexible business
policies into tangible enforcement
Takes a system, not a single product
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Unified Access Value Proposition and Reference DesignDifferentiating Characteristics of One Network
Aironet APs
WLCCisco Catalyst 4500E, Cisco Catalyst 3K-X
Cisco Prime Infrastructure
WISM2/WLC
Identity Services Engine
Cisco Catalyst 6500/VSS
TrustSec Secure Group Access to Simplify the Network and Enable Virtualized Data Center Services
Application Visibility and Control
Application-Aware Networking to Enable Collaboration, Video, and Other Apps
Resiliency Maximized Network Availability with Virtual Switching and Stateful Switch Over
Smart Operations Reduce Operating Expenses and Improve Network Application and Service Delivery
OS Consistency: IOS 15.0 Cisco Validated Designs for Campus Deployment
Cisco Catalyst 6500 for Campus Core Cisco Catalyst 4500E and 3K-X
for Campus Wired AccessCisco Unified Wireless Network
Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 23
BYOD Smart Solution
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
What Is a Cisco BYOD Smart Solution?Smart Solution Components:
Scale from Commercial to Enterprise
Tested, Validated, Documented Designs
Integrated Cisco + 3rd Party Roadmaps
Technical Training and Support
Enablement: Demos, ROI Tools, Financing
Cisco and Partner Services
www.cisco.com/go/partnerbyod
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Reference Design Architecture
Comprehensive architecture
Cisco and 3rd party products integrated to
solve business problem
Validated and Design Guides provided
www.cisco.com/go/designzone
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Bringing it All TogetherUnified Access
Wireless and wired policy and managementIdentity-based access control
Security/PolicyData loss and threat prevention
Context aware access to data
ManagementSingle system for wired / wireless / VPN
Provisioning and Mobile Device Management
ExperienceUncompromised video, voice in any deployment mode
Consistent, portable across platforms
ApplicationsNative or virtual application delivery
Collaborative and corporate applications
Top Lessons Learned from many customers
and partners
BYOD and other challenges require a
complete strategy, not point products or
technology
Don’t forget to involve Legal and HR --- new implications for users
and entitlement policies
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
A Phased Approach to Cisco BYODAddressing Customer BYOD Needs
BYOD Architectural Services Approach
BYOD Architectural Deployment (Infrastructure Build Out)
Incremental BYOD Architectural Change and Maintenance
PLAN BUILD MANAGE
1
BYOD Workshop
4
BYOD Optimization and Technical Support
3
BYOD Partner-Led and Cisco-Led Services
2
BYOD Assessment
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
BYOD Is Experiencing Phenomenal Growth. But IT is Experiencing Challenges to Stay Ahead of the Network Impact.
Key Takeaways
TREND IMPACT PREPARE
Customers’ networks are being impacted in terms of Security, Policy, Coverage, and Reliability, Visibility and Management.
A Unified Access Network combines the network features you have with innovations you need to prepare for BYOD.