the context aware network a holistic approach to byod

38
The Context Aware Network A Holistic Approach to BYOD

Upload: cisco-canada

Post on 20-Aug-2015

1.682 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The Context Aware Network A Holistic Approach to BYOD

The Context Aware Network

A Holistic Approach to BYOD

Page 2: The Context Aware Network A Holistic Approach to BYOD

Trends

BYOD at Cisco

Cisco® BYOD Solution

Use Cases

Summary

Bring Your

Own Device

Page 3: The Context Aware Network A Holistic Approach to BYOD

Trends

#CiscoPlusCA

Page 4: The Context Aware Network A Holistic Approach to BYOD

15 billion new networked mobile

devices by 2015

3/4 of employees uses

MULTIPLE DEVICES for work

56% of information workers

spend time working OUTSIDE THE OFFICE

100% of IT staff STRUGGLE

to keep up with mobile needs

Demand for Mobility

Page 5: The Context Aware Network A Holistic Approach to BYOD

Human

Resources

Application

Team

Compliance

Operations

Endpoint

Team

Network

Team

Security

Operations

BYOD: An Enterprise Wide Project

Page 6: The Context Aware Network A Holistic Approach to BYOD

7

Sees All Traffic

Routes All Requests Sources All Data

Controls All Flows

Handles All Devices

Touches All Users

Shapes All Streams

A New Approach Is Required

Page 7: The Context Aware Network A Holistic Approach to BYOD

One Network, One Policy, One Management

Device ownership is irrelevant: corporate, personal, guest, etc…

BYO devices need wired, wireless, remote and mobile access

BYO devices can be any device: Windows PCs, Mac OS devices, any tablet, any smartphone, gaming consoles, printers…etc

More Than Just Personal Devices

More Than Just Wireless Access

More Than Just iPads

Cisco Unique BYOD Value Proposition

Page 8: The Context Aware Network A Holistic Approach to BYOD

BYOD at Cisco

#CiscoPlusCA

Page 9: The Context Aware Network A Holistic Approach to BYOD

20,581 iPhones

3.9% Growth

73M online

meetings/yr.

12,000+ Apple Macs

6,700+ Linux Desktops

87,000+ Windows PCs

12,290 BlackBerry Devices

-1.6% Growth

2,185 Other Devices

-3.8% Growth

5,234 Android Devices

9.5% Growth

8,144 iPad

2,104 Cius

Cisco-On-Cisco Client Mix

Page 10: The Context Aware Network A Holistic Approach to BYOD

59% more devices

32% more users

20% fewer cases

Cisco-On-Cisco Realized Gain

Page 11: The Context Aware Network A Holistic Approach to BYOD

Cisco BYOD Solution

#CiscoPlusCA

Page 12: The Context Aware Network A Holistic Approach to BYOD

BYOD Spectrum Where are you on this BYOD spectrum?

Limit Advanced Enhanced Basic

Environment requires tight controls

Company’s only device

Manufacturing environments

Trading floors

Classified government networks

Traditional enterprises

Focus on basic services and easy access for

almost anybody

Broader device types but Internet only

Education environments

Public institutions

Simple guests

Enable differentiated services and on-boarding with security both onsite

and offsite

Multiple device types plus access methods

Healthcare

Early BYOD adopters

Contractor enablement

Company’s native applications, new

services, and full control

Multiple device types, company issued

Innovative enterprises

Retail on demand

Mobile sales services

(video, collaboration, etc.)

Page 13: The Context Aware Network A Holistic Approach to BYOD

400 IT professionals interviewed about BYOD, more than 65 percent

said they don't have the necessary tools in place to manage personal

devices on the corporate network, and 27 percent said they aren’t

certain of all the personal devices that are accessing the network.

#CiscoPlusCA

Page 14: The Context Aware Network A Holistic Approach to BYOD

Cisco BYOD Smart Solution Elements

Core Infrastructure

Policy Management Central Management

Collaboration Application

Secure Mobility

Page 15: The Context Aware Network A Holistic Approach to BYOD

Cisco Switching Differentiators for BYOD

Enabling the BYOD Experience

High

Availability

Catalyst 3K-X

Catalyst 4K

Next Generation Workspace

Any Device HD Video

Lower TCO

PoE

Leadership Video Security

VDI

Smart Operations

Cisco Switches Scale to Meet Diverse Deployment Scenarios

Cisco Switching Differentiators

• Unique Support of Next Generation Workspace

populated by smartphones, tablets and virtual

desktops

• Support Widest Range of Devices

• Prevent eavesdropping and facilitate

compliance with MACSec Encryption

• Device profilers and device Sensors, Deliver

Consistent Policy

• Monitor mode greatly simplifies 802.1x

deployments

Page 16: The Context Aware Network A Holistic Approach to BYOD

Cisco Mobility Technology for High Performance Wireless Network Best-of-Breed Mobility Technology

ClientLink 2.0 Improved Performance

Proactive and automatic

beamforming

For 802.11n and legacy

clients

VideoStream Improved Performance

Wired multicast over a

Wireless network

Clean Air Improved Performance

Proactive and automatic

interference mitigation

AP3600 Access Point Innovation

The Tablet AP, Enhanced

throughput and coverage

targeting advanced

applications for tablets and

smart devices

Identity Services Engine (ISE) - Unified Policy Management

Prime NCS – Central Network Management

Cisco Wireless Technology for BYOD

Page 17: The Context Aware Network A Holistic Approach to BYOD

Universal Management for BYOD Deployments

Improved Network Visibility - Faster Troubleshooting - Eliminate Configuration Errors

Converged Security and Policy Monitoring

Contextual status and monitoring across wired & wireless networks

Centrally Organizes Day 1-to-n Management tasks

Instructional configuration workflows

Reduces the Time to Troubleshoot

Integration with Cisco NCS Prime

Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services

Cisco Prime NCS for Unified Network Management

Page 18: The Context Aware Network A Holistic Approach to BYOD

Identity and Context Centric Security

TrustSec Architecture

Security Policy

Attributes Centralized Policy Engine

Business-Relevant

Policies

User and Devices

Dynamic Policy & Enforcement

APPLICATION

CONTROLS

MONITORING AND

REPORTING SECURITY POLICY

ENFORCEMENT

WHEN WHAT

WHERE

HOW WHO

Identity

Page 19: The Context Aware Network A Holistic Approach to BYOD

Identity Services Engine (ISE) for Advanced Policy Management

IDENTITY PROFILING

VLAN 10

VLAN 20

Wireless LAN Controller

DHCP

RADIUS

SNMP

NETFLOW

HTTP

DNS

ISE

Unified Access Management

802.1x EAP User

Authentication

1

HQ

2:38pm

Profiling to identify device

2

6

Full or partial access granted

Personal

asset

Company asset

3

Posture of the device

Policy Decision

4

5

Enforce policy in the network

Corporate

Resources

Internet Only

Policy: Who, What, Where, When, How

Page 20: The Context Aware Network A Holistic Approach to BYOD

Putting the End User in Control

Simplified On-Boarding for BYOD

• Reduced Burden on IT staff

– Device On-Boarding

– Self Registration

– Supplicant Provisioning

• Reduced Burden on Help Desk Staff

– Seamless, Intuitive User Experience

• Self Service Model

– My Device Registration Portal

– Guest Sponsorship Portal

Page 21: The Context Aware Network A Holistic Approach to BYOD

Device Authentication

Identity Differentiators

Monitor Mode

Flexible Authentication Sequence

IP Telephony Support

Support for Virtual Desktop

Environments

Cisco Catalyst® Switch

Network Device

802.1X

IP Phones Authorized

Users

Guests

MAB and Profiling Web Auth

Authentication Features

IEEE 802.1x MAC Auth Bypass Web Authentication

Tablets

Consistent identity features supported on all Catalyst switch models

Leveraging Your Infrastructure Network

Page 22: The Context Aware Network A Holistic Approach to BYOD

Personal

iPad Policy

[restricted access]

Access Point Printer Policy

[place on VLAN X]

Device Profiling

DEPLOYMENT SCENARIO WITH CISCO IOS SENSOR

COLLECTION

Switch Collects Device Related

Data and Sends Report to ISE

CLASSIFICATION ISE Classifies Device, Collects Flow Information and Provides Device Usage Report

AUTHORIZATION ISE Executes Policy Based on User and Device

Efficient Device

Classification Leveraging

Infrastructure

CDP LLDP DHCP MAC

Printer Personal iPad ISE

CDP LLDP DHCP MAC

DEVICE PROFILING Profiling for both wired and wireless devices

POLICY

Access

Point

Cisco

Innovation

The Solution

Automated Device Classification Using Cisco Infrastructure

Page 23: The Context Aware Network A Holistic Approach to BYOD

Wired, Wireless,

VN User

Device Posture Assessment

Non-

Compliant

Temporary Limited Network

Access Until Remediation Is

Complete

Sample Employee Policy:

• Microsoft patches updated

• McAfee AV installed, running, and current

• Corp asset checks

• Enterprise application running

Challenge:

• Understanding health of device

• Varying level of control over devices

• Cost of Remediation

Value:

• Temporal (web-based) or Persistent Agent

• Automatic Remediation

• Differentiated policy enforcement-based on role

ISE Posture Ensures Endpoint Health before Network Access

Page 24: The Context Aware Network A Holistic Approach to BYOD

Guest Policy

Guest Management

Guests

Web Authentication

Wireless or Wired Access

Internet-Only Access

Provision: Guest Accounts via

Sponsor Portal

Notify: Guests of Account Details

by Print, Email, or SMS

Manage: Sponsor Privileges,

Guest Accounts and Policies,

Guest Portal

Report: On All Aspects of

Guest Accounts

Internet

ISE Guest Service for Managing Guests

Page 25: The Context Aware Network A Holistic Approach to BYOD

News

Email

Social Networking

Enterprise SaaS

Cisco Web

Security Appliance

Information Sharing

Between ASA and WSA

Corporate AD

Users Outside

Network

ASA &

IPS

Cisco Cloud

and Web Security

Extended Security on and off-premise AnyConnect, ASA, IPS, WSA & ScanSafe

Page 26: The Context Aware Network A Holistic Approach to BYOD

• User friendly design

• Industry-leading connectivity features

• Integrated connection manager for enhanced security

• Key Features:

• Always On or On-Demand VPN

• Auto Re-Connect (Persistence)

• IPSec, SSL & DTLS VPN

• Clientless WebVPN

• Optimal Gateway Selection

• Endpoint Posture Assessment

Remote Access: Cisco AnyConnect Optimized User Mobility

Page 27: The Context Aware Network A Holistic Approach to BYOD

Device inventory

Device provisioning/de-provisioning

Device data security

Device application security

Cost management

Full or selective device remote wipe

MDM Partners Cisco

ISE AnyConnect ASA ScanSafe WSA

User/device

authentication

Posture assessment

Policy enforcement

Context aware

access control

Secure remote access Threat defense

Web usage policy

Web application

DLP

Device Management

IPS

MDM & Cisco Solutions

Page 28: The Context Aware Network A Holistic Approach to BYOD

NCS Prime

Cisco WLAN

Controller

3rd Party

MDM Appliance

MDM Manager

Wired Network Devices

Cisco Catalyst

Switches

Office Wired Access Office Wireless Access

ISE

Remote Access

ASA Firewall

CSM / ASDM

Simple BYOD Deployment Diagram Tying all the pieces together

Page 29: The Context Aware Network A Holistic Approach to BYOD

Advanced Collaboration with Cisco Jabber

Win, Mac iPad, Cius Smartphone Web

Page 30: The Context Aware Network A Holistic Approach to BYOD

WebEx: Industry-Leading Meeting Solutions

Industry-leading Web Conferencing

• Audio, web, and high-quality video

• Meeting, Training, Event, and Support versions

Document, Application, Desktop Sharing

Integrated with TelePresence and Jabber for Enhanced Collaboration

Delivered Securely Over Cisco Collaboration Cloud

Consistent, Cross-Platform Experience

• Windows, Mac, Linux, Unix, Solaris

• Supported on leading mobile devices

• Available in 13 languages

Page 31: The Context Aware Network A Holistic Approach to BYOD

Use Cases

#CiscoPlusCA

Page 32: The Context Aware Network A Holistic Approach to BYOD

Unified Policy-Based Management

• Provide identity-aware networking

and data integrity

• Universally and effectively control

user and device access

Uncompromised Security

• Provide secure, scalable guest

access solutions

• Authenticate users and endpoints

through wired wireless access with

consistent policy across the

enterprise network

Simplified On-Boarding

• Provide zero-touch device

registration and provisioning of

employee and guest devices

BYOD Use Case: Basic Implementation

Cisco® ISE

Cisco Prime™ NCS

Wireless Wired

Devices Layer

Desktop/Notebooks

Tablets

Smartphones

Games and Printers

Thin and Virtual Clients

Business Policy: Enable Wired and Wireless Access for Company and Personal Devices

Page 33: The Context Aware Network A Holistic Approach to BYOD

BYOD Use Case: Advanced Implementation

Cisco Quad™

Cisco Jabber™

Cisco WebEx

®

Cisco ISE Cisco Prime™ NCS Router Wireless Wired

Enterprise Applications

Cisco AnyConnect™ Cisco ASA Cisco ® ScanSafe Cisco WSA

Devices Layer

Desktop and Notebook Computers

Tablets

Smartphones

Games and Printers

Thin and Virtual Clients

Enable a Full Mobile and Collaboration Experience

Provide integrated policy management with mobile device management, deliver granular endpoint controls,

provide layered security, and enforce network security policies for BYOD deployments

Business Policy: Provide Granular Access to Full Company Workspace, Both On and Off Site

Page 34: The Context Aware Network A Holistic Approach to BYOD

Summary

#CiscoPlusCA

Page 35: The Context Aware Network A Holistic Approach to BYOD

Embrace Mobility While Ensuring Security

Some Questions to Answer

Do I have the WLAN capacity and reliability to support an

increased number of mobile devices and future applications?

How do I enforce security policies on noncompliant devices?

How do I grant different levels of access to protect my

network?

How do I help ensure data loss prevention on devices for

which I do not have visibility?

How do I mitigate emerging threats targeted

at mobile devices?

How do I monitor and troubleshoot user and

client connectivity problems on my access

(wired and wireless) network?

Is my network capable of delivering the scalability and

performance required to achieve the benefits

of a BYOD strategy?

Page 36: The Context Aware Network A Holistic Approach to BYOD

Is the Network Ready for Next Generation Applications?

Mobile BYOD clients drive advanced applications for Voice, Video, and VXI

Next Generation Applications require more bandwidth and performance

Before: 1 Employee =

1 PC

Today: 1 Employee = 3 or more

Devices

Tomorrow: Multimedia Applications

= High Bandwidth Use

Network Infrastructure Will Have

To Scale

Looking Ahead

Page 37: The Context Aware Network A Holistic Approach to BYOD

Q&A

#CiscoPlusCA

Page 38: The Context Aware Network A Holistic Approach to BYOD

Follow @CiscoCanada and join the #CiscoPlusCA conversation

Access today’s presentations at cisco.com/ca/plus

We value your feedback. Please be sure to complete the Evaluation Form for this session.